We consider the problem of secure pattern matching that uses evaluation of non-deterministic string matching automata (NSMA). Our solution is based on a Key Words Multi-party computation, two-party computation, secure computation, privacy, security, pattern matching, string matching automata, bit-parallel pattern matching, outsourcing.