Amanote Research

Amanote Research

    RegisterSign In

5PM: Secure Pattern Matching

Journal of Computer Security - Netherlands
doi 10.3233/jcs-130481
Full Text
Open PDF
Abstract

Available in full text

Categories
RiskComputer NetworksHardwareCommunicationsReliabilitySafetyArchitectureQualitySoftware
Date

November 22, 2013

Authors
Joshua BaronKarim El DefrawyKirill MinkovichRafail OstrovskyEric Tressler
Publisher

IOS Press


Related search

Constrained Pattern Matching

ACM Transactions on Algorithms
Mathematics
2011English

General Pattern Matching

Chapman & Hall/CRC Applied Algorithms and Data Structures series
2009English

Combinatorial Pattern Matching

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1994English

Pattern-Matching Commands

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1980English

Pattern Matching in Strings

Chapman & Hall/CRC Applied Algorithms and Data Structures series
1998English

Fast Practical Multi-Pattern Matching

Information Processing Letters
Signal ProcessingComputer Science ApplicationsInformation SystemsTheoretical Computer Science
1999English

Online Timed Pattern Matching Using Automata

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2018English

Basic Pattern Matching Calculi: A Fresh View on Matching Failure

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2004English

Visually Controlled Matching of Pattern Movement

Perception & Psychophysics
1992English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy