Amanote Research
Register
Sign In
5PM: Secure Pattern Matching
Journal of Computer Security
- Netherlands
doi 10.3233/jcs-130481
Full Text
Open PDF
Abstract
Available in
full text
Categories
Risk
Computer Networks
Hardware
Communications
Reliability
Safety
Architecture
Quality
Software
Date
November 22, 2013
Authors
Joshua Baron
Karim El Defrawy
Kirill Minkovich
Rafail Ostrovsky
Eric Tressler
Publisher
IOS Press
Related search
Constrained Pattern Matching
ACM Transactions on Algorithms
Mathematics
General Pattern Matching
Chapman & Hall/CRC Applied Algorithms and Data Structures series
Combinatorial Pattern Matching
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Pattern-Matching Commands
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Pattern Matching in Strings
Chapman & Hall/CRC Applied Algorithms and Data Structures series
Fast Practical Multi-Pattern Matching
Information Processing Letters
Signal Processing
Computer Science Applications
Information Systems
Theoretical Computer Science
Online Timed Pattern Matching Using Automata
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Basic Pattern Matching Calculi: A Fresh View on Matching Failure
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Visually Controlled Matching of Pattern Movement
Perception & Psychophysics