05866nam 22006495 450 991030024050332120250707130935.04-431-54183-710.1007/978-4-431-54183-7(CKB)3710000000337912(EBL)1966184(OCoLC)908085245(SSID)ssj0001424534(PQKBManifestationID)11802000(PQKBTitleCode)TC0001424534(PQKBWorkID)11368543(PQKB)11388063(DE-He213)978-4-431-54183-7(MiAaPQ)EBC1966184(PPN)183515714(EXLCZ)99371000000033791220150113d2015 u| 0engur|n|---|||||txtccrMicrosurgical Anatomy and Surgery of the Posterior Cranial Fossa Surgical Approaches and Procedures Based on Anatomical Study /by Toshio Matsushima1st ed. 2015.Tokyo :Springer Japan :Imprint: Springer,2015.1 online resource (328 p.)Description based upon print version of record.4-431-54182-9 Includes bibliographical references at the end of each chapters and index.Chapter 1. The “Rules of Three” in the Posterior Cranial Fossa -- Chapter 2. Neural Structures: the Brainstem, Cerebellum, Cerebellar Peduncles, and Fourth Ventricle -- Chapter 3. Three Cerebellar Arteries: Superior Cerebellar Artery, Anterior Inferior Cerebellar Artery, and Posterior Inferior Cerebellar Artery.- Chapter 4. The Veins of the Posterior Cranial Fossa: Nomenclature.-Chapter 5. The Bridging Veins in the Posterior Cranial Fossa.- Chapter 6. Midline Suboccipital Approach and Its Variations for Fourth Ventricular or Cerebellar Hemispheric Lesions.- Chapter 7. Microsurgical Anatomy of the Cerebellomedullary Fissure and Variations of the Transcerebellomedullary Fissure Approach.- Chapter 8. The Cerebellopontine Angle: Basic Structures and the “Rules of Three”.- Chapter 9. The Retrosigmoid Lateral Suboccipital Approach: Basic Approach and Variations.- Chapter 10. Anatomy for Microvascular Decompression Procedures: Relationships between Cranial Nerves and Vessels, Preoperative Images, and Anatomy for the Stitched Sling Retraction Technique.- Chapter 11. Microvascular Decompression Surgery for Trigeminal Neuralgia: Special Reference to the Infratentorial Lateral Supracerebellar Approach Using the Tentorial Stitched Sling Retraction Method.- Chapter 12. Microvascular Decompression Surgery for Hemifacial Spasm: the Lateral Suboccipital Infrafloccular Approach.- Chapter 13. Microvascular Decompression for Glossopharyngeal Neuralgia: Surgical Approaches Depending on the Offending Artery -- Chapter 14. Microsurgical Anatomy of the Internal Auditory Canal and Surrounding Structures and Vestibular Schwannoma Surgery -- Chapter 15. Meningiomas of the Cerebellopontine Angle: Classification and Differences in the Surgical Removal of Each Type through the Lateral Suboccipital Retrosigmoid Approach -- Chapter 16. Surgical Anatomy of the Posterior Part of the Foramen Magnum and the Posterior Paramedian Approaches.- Chapter 17. Surgical Anatomy of and Approaches through the Lateral Foramen Magnum: the Transcondylar Fossa and Transcondylar Approaches.- Chapter 18. The Temporal Bone: Basic Anatomy and Approaches to Internal Auditory Canal.- Chapter 19. Posterior and Anterior Transpetrosal Approaches -- Chapter 20. Microsurgical Anatomy of and Surgical Approaches to the Jugular Foramen -- Chapter 21. Occipital Artery–Posterior Inferior Cerebellar Artery Bypass Surgery.This book provides the anatomy of the posterior fossa, together with the main associated surgical techniques, which are detailed in numerous photographs and step-by-step color illustrations. The text presents approaches and surgical techniques such as the trans-cerebellomedullary fissure approach and its variation to the fourth ventricle, as well as the cerebellomedullary cistern, infratentorial lateral supracerebellar approach to the fifth cranial nerve in the upper cerebellopontine angle, infrafloccular approach to the root exit zone of the seventh cranial nerve, transcondylar fossa approach through the lateral part of the foramen magnum, and the stitched sling retraction technique utilized during microvascular decompression procedures for trigeminal neuralgia and hemifacial spasm. It also describes in detail the bridging veins of the posterior fossa, especially the petrosal vein, and bridging veins to the tentorial sinuses, which can block approaches to the affected area. The original Japanese version of this work was published 8 years ago, and has established itself as a trusted guide, especially among young neurosurgeons who need to study various surgical approaches and techniques. In the course of being translated into English, some sections have been revised and new information has been added. The author hopes that the book will help neurosurgeons around the world perform safer operations with confidence.Nervous systemSurgeryOtolaryngologyAnatomyNeurosurgeryOtorhinolaryngologyAnatomyNervous systemSurgery.Otolaryngology.Anatomy.Neurosurgery.Otorhinolaryngology.Anatomy.610611617.48617.5Matsushima Toshioauthttp://id.loc.gov/vocabulary/relators/aut835570BOOK9910300240503321Microsurgical Anatomy and Surgery of the Posterior Cranial Fossa2512375UNINA05781nam 22008415 450 991048483550332120251226202448.03-319-12475-710.1007/978-3-319-12475-9(CKB)3710000000269702(SSID)ssj0001372759(PQKBManifestationID)11798060(PQKBTitleCode)TC0001372759(PQKBWorkID)11323424(PQKB)10551361(DE-He213)978-3-319-12475-9(MiAaPQ)EBC5592318(MiAaPQ)EBC6306874(Au-PeEL)EBL5592318(OCoLC)893105174(Au-PeEL)EBL6306874(PPN)182097897(EXLCZ)99371000000026970220141001d2014 u| 0engurnn#008mamaatxtccrProvable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings /edited by Sherman S.M. Chow, Joseph K. Liu, Lucas C.K. Hui, Siu Ming Yiu1st ed. 2014.Cham :Springer International Publishing :Imprint: Springer,2014.1 online resource (XVIII, 351 p. 41 illus.)Security and Cryptology,2946-1863 ;8782Bibliographic Level Mode of Issuance: Monograph3-319-12474-9 Invited Paper -- Password-Based Authenticated Key Exchange: An Overview -- Practical and Provably Secure Attribute Based Encryption -- Fundamental -- Adaptive versus Static Security in the UC Model -- Impossibility of Surjective Icart-Like Encodings -- Symmetric Key Encryption -- On the practical security bound of GF-NLFSR structure with SPN round function -- Misuse-Resistant Variants of the OMD Authenticated Encryption Mode -- A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function -- Authentication.-Forward-Secure Sequential Aggregate Message Authentication Revisited: Formalization and a Provably Secure Scheme -- A Provable Secure Batch Authentication Scheme for EPCGen2 Tags -- Signatures -- Generic Transformation to Strongly Existentially Unforgettable Signature Schemes with Leakage Resiliency -- Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures -- Protocol -- Verifiable Computation in Multiparty Protocols with Honest Majority -- Public Key Encryption -- Lossy Trapdoor Relation and Its Application to Lossy Encryption and Adaptive Trapdoor Relation.-Compact Public Key Encryption with Minimum Ideal Property of Hash Functions -- Proxy Re-Encryption -- RCCA-Secure Multi-use Bidirectional Proxy Re-Encryption with Master Secret Security -- Fine-grained Conditional Proxy Re-encryption and Application -- Predicate Encryption -- Constructing Subspace Membership Encryption through Inner Product Encryption -- Efficient (Anonymous) Compact HIBE From Standard Assumptions -- Attribute-based Cryptosystem -- Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts -- Attribute-Based Signcryption : Signer Privacy, Strong Unforgetability and IND-CCA2 Security in Adaptive-Predicates Attack -- Short Papers -- How to Use Pseudorandom Generators in Unconditional Security Settings -- Equivalence between MAC and PRF for Blockcipher based Constructions -- A Short Fail-Stop Signature Scheme from Factoring -- Computational Soundness of Asymmetric Bilinear Pairing-based Protocols -- Timed-Release Computational Secret Sharing Scheme and Its Applications -- Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage -- Complete Robustness in Identity-Based Encryption.This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 20 full papers and 7 short papers presented together with 2 invited talks were carefully reviewed and selected from 68 submissions. The papers are grouped in topical sections on fundamental, symmetric key encryption, authentication, signatures, protocol, public key encryption, proxy re-encryption, predicate encryption, and attribute-based cryptosystem.Security and Cryptology,2946-1863 ;8782CryptographyData encryption (Computer science)Data protectionComputers and civilizationInformation technologyManagementElectronic data processingManagementCryptologyData and Information SecurityComputers and SocietyComputer Application in Administrative Data ProcessingIT OperationsCryptography.Data encryption (Computer science).Data protection.Computers and civilization.Information technologyManagement.Electronic data processingManagement.Cryptology.Data and Information Security.Computers and Society.Computer Application in Administrative Data Processing.IT Operations.005.82Chow Sherman S.Medthttp://id.loc.gov/vocabulary/relators/edtLiu Joseph K.edthttp://id.loc.gov/vocabulary/relators/edtHui Lucas C.Kedthttp://id.loc.gov/vocabulary/relators/edtYiu Siu Mingedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910484835503321Provable Security772128UNINA