O. Abul, F. Bonchi, and M. Nanni, Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases, 2008 IEEE 24th International Conference on Data Engineering, pp.376-385, 2008.
DOI : 10.1109/ICDE.2008.4497446

URL : http://www-kdd.isti.cnr.it/NWA/NWA_ICDE08.pdf

O. Abul, F. Bonchi, and F. Giannotti, Hiding Sequential and Spatiotemporal Patterns, IEEE Transactions on Knowledge and Data Engineering, vol.22, issue.12, pp.1709-1723, 2010.
DOI : 10.1109/TKDE.2009.213

A. Aho and M. J. Corasick, Efficient string matching: an aid to bibliographic search, Communications of the ACM, vol.18, issue.6, 1975.
DOI : 10.1145/360825.360855

R. Chen, N. Mohammed, B. C. Fung, B. C. Desai, and L. Xiong, Publishing set-valued data via differential privacy, PVLDB, vol.4, issue.11, pp.1087-1098, 2011.

G. Cormode, H. Karloff, and A. Wirth, Set cover algorithms for very large datasets, Proceedings of the 19th ACM international conference on Information and knowledge management, CIKM '10, pp.479-488, 2010.
DOI : 10.1145/1871437.1871501

M. Crochemore, C. Hancart, and T. Lecroc, Algorithm on strings, 2007.
DOI : 10.1017/CBO9780511546853

URL : https://hal.archives-ouvertes.fr/hal-00619586

C. Dwork, Differential Privacy, pp.1-12, 2006.
DOI : 10.1007/11787006_1

A. Gkoulalas-divanis and G. Loukides, Revisiting sequential pattern hiding to enhance utility, Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '11, pp.1316-1324, 2011.
DOI : 10.1145/2020408.2020605

A. Gkoulalas-divanis and G. Loukides, Utility-guided clustering-based transaction data anonymization, Trans. Data Privacy, vol.5, issue.1, pp.223-251, 2012.

M. Götz, S. Nath, and J. Gehrke, MaskIt, Proceedings of the 2012 international conference on Management of Data, SIGMOD '12, pp.289-300, 2012.
DOI : 10.1145/2213836.2213870

R. Gwadera, A. Gkoulalas-divanis, and G. Loukides, Permutation-Based Sequential Pattern Hiding, 2013 IEEE 13th International Conference on Data Mining, pp.241-250, 2013.
DOI : 10.1109/ICDM.2013.57

URL : http://users.cs.cf.ac.uk/G.Loukides/PH_ICDM.pdf

Y. He, S. Barman, D. Wang, and J. F. Naughton, On the complexity of privacy-preserving complex event processing, Proceedings of the 30th symposium on Principles of database systems of data, PODS '11, pp.165-174, 2011.
DOI : 10.1145/1989284.1989304

URL : http://pages.cs.wisc.edu/%7Esid/papers/CEP_privacy.pdf

G. Loukides and R. Gwadera, Optimal event sequence sanitization, Proceedings of the 2015 SIAM International Conference on Data Mining, pp.775-783
DOI : 10.1137/1.9781611974010.87

URL : https://epubs.siam.org/doi/pdf/10.1137/1.9781611974010.87

A. Monreale, D. Pedreschi, R. G. Pensa, and F. Pinelli, Anonymity preserving sequential pattern mining, Artificial Intelligence and Law, vol.30, issue.4, pp.141-173, 2014.
DOI : 10.1145/604264.604271

S. R. Oliveira and O. R. Za¨?aneza¨?ane, Protecting sensitive knowledge by data sanitization, Third IEEE International Conference on Data Mining, pp.211-218, 2003.
DOI : 10.1109/ICDM.2003.1250990

URL : http://www.cs.ualberta.ca/%7Ezaiane/postscript/icdm03.pdf

G. Poulis, S. Skiadopoulos, G. Loukides, and A. Gkoulalas-divanis, Apriori-based algorithms for km-anonymizing trajectory data, Trans. Data Privacy, vol.7, issue.2, pp.165-194, 2014.

V. Rastogi and S. Nath, Differentially private aggregation of distributed time-series with transformation and encryption, Proceedings of the 2010 international conference on Management of data, SIGMOD '10, pp.735-746, 2010.
DOI : 10.1145/1807167.1807247

URL : http://research.microsoft.com/en-us/people/sumann/paste-tr.pdf

R. Sherkat, J. Li, and N. Mamoulis, Efficient Time-Stamped Event Sequence Anonymization, ACM Transactions on the Web, vol.8, issue.1, pp.1-4, 2013.
DOI : 10.1145/2532643

URL : http://www.cs.hku.hk/research/techreps/document/TR-2011-02.pdf

X. Sun and P. Yu, Hiding Sensitive Frequent Itemsets by a Border-Based Approach, Journal of Computing Science and Engineering, vol.1, issue.1, pp.426-433, 2005.
DOI : 10.5626/JCSE.2007.1.1.074

URL : http://www.ndsl.kr/soc_img/society/kiss/E1EIKI/2007/v1n1/E1EIKI_2007_v1n1_74.pdf

V. S. Verykios, A. K. Emagarmid, E. Bertino, Y. Saygin, and E. Dasseni, Association rule hiding, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.4, pp.434-447, 2004.
DOI : 10.1109/TKDE.2004.1269668

URL : http://www.comp.nus.edu.sg/~kalnis/cs5322/Verykios03.pdf

D. Wang, Y. He, E. Rundensteiner, and J. F. Naughton, Utility-maximizing event stream suppression, Proceedings of the 2013 international conference on Management of data, SIGMOD '13, pp.589-600, 2013.
DOI : 10.1145/2463676.2465305

URL : http://pages.cs.wisc.edu/%7Eheyeye/paper/CEP-privacy-SIGMOD13.pdf