04564nam 2200673 a 450 991082033560332120240313190732.09781118553459111855345497811185534421118553446978129944894012994489419781118553428111855342X(CKB)2550000001018502(EBL)1163673(OCoLC)850205192(SSID)ssj0000856612(PQKBManifestationID)11457052(PQKBTitleCode)TC0000856612(PQKBWorkID)10818639(PQKB)11294855(MiAaPQ)EBC1163673(Au-PeEL)EBL1163673(CaPaEBR)ebr10683276(CaONFJC)MIL476144(Perlego)1001944(EXLCZ)99255000000101850220121107d2013 uy 0engur|n|---uuuuutxtrdacontentcrdamediacrrdacarrierPractical colonoscopy /Jerome D. Waye, James Aisenberg, Peter H. Rubin ; with the assistance of Shannon Morales1st ed.Chichester, West Sussex, U.K. John Wiley & Sons20131 online resource (xii, 199 pages) illustrationsDescription based upon print version of record.9780470670583 0470670584 Includes bibliographical references and index.The endoscopy unit, colonoscope, and accessories -- The role of the endoscopy assistant during colonoscopy -- Indications and contraindications for colonoscopy -- Preparation for colonoscopy -- Sedation for colonoscopy -- Colonoscopy technique : the ins and outs -- Colonoscopic findings -- Diagnostic biopsy -- Thermal techniques : electrosurgery, argon plasma coagulation, and laser -- Basic principles and techniques of polypectomy -- Difficult polypectomy -- Management of malignant polyps -- Therapeutic colonoscopy -- Complications of colonoscopy -- Quality in colonoscopy -- Teaching and training in colonoscopy -- Computed tomographic colonography (virtual colonoscopy) -- Advanced imaging techniques -- The future of colonoscopy.Practical Colonoscopy Jerome D. Waye, MD, Director of Endoscopic Education, Clinical Professor of Medicine, Mount Sinai Medical Center, New York, NY, USA James Aisenberg, MD, Clinical Professor of Medicine, Mount Sinai Medical Center, New York, NY, USA Peter H. Rubin, MD, Associate Clinical Professor of Medicine, Mount Sinai Medical Center, New York, NY, USA Are you looking for a rapid-reference, step-by-step guide to teach you all that you need to know in order to perform high-quality colonoscopy? Then Practical Colonoscopy is the perfect resource for you. Drawing upon their collective century of experience performing and teaching colonoscopy, Drs. Waye, Aisenberg and Rubin share the "pearls" and principles that they find most useful in every day practice. The team is led by Dr. Jerry Waye, one of the world's leading practitioners and teachers of endoscopy. Up-to-date, practical, clinically-focused, succinct and packed full of outstanding illustrations and videos, this multi-media tool guides you through the core aspects of best colonoscopy practice. Key features include: * Lucid, step-by-step explanations of the techniques and principlesthat will help you to achieve outstandingresults * A companionwebsite that contains 39 videos illustrating important techniques, findings, and problems * Text-boxesthat highlight and organize the pearls and pitfalls of colonoscopy practice * Line diagrams that illustrate important strategies and maneuvers * High-resolution still photographs that depict important findings and techniques GI trainees will find this the perfect introductory guide to colonoscopy, and more experienced specialists will value it as a refresher tool that is replete with hundreds of new pearls provided by world experts. Practical Colonoscopy is a must-have tool for today's colonoscopist. ColonoscopyColonoscopy.616.3/407545Waye Jerome D.1932-882857Aisenberg James1605823Rubin Peter H1605824Morales Shannon1605825MiAaPQMiAaPQMiAaPQBOOK9910820335603321Practical colonoscopy3931279UNINA08627nam 22007815 450 991064777600332120251113211519.09783031246678303124667510.1007/978-3-031-24667-8(MiAaPQ)EBC7188488(Au-PeEL)EBL7188488(CKB)26076441400041(DE-He213)978-3-031-24667-8(PPN)267807058(EXLCZ)992607644140004120230131d2022 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierSocial Robotics 14th International Conference, ICSR 2022, Florence, Italy, December 13–16, 2022, Proceedings, Part I /edited by Filippo Cavallo, John-John Cabibihan, Laura Fiorini, Alessandra Sorrentino, Hongsheng He, Xiaorui Liu, Yoshio Matsumoto, Shuzhi Sam Ge1st ed. 2022.Cham :Springer Nature Switzerland :Imprint: Springer,2022.1 online resource (607 pages)Lecture Notes in Artificial Intelligence,2945-9141 ;13817Print version: Cavallo, Filippo Social Robotics Cham : Springer,c2023 9783031246661 Includes bibliographical references and index.Social robot navigation and interaction capabilities (voice, tactile) -- Socially-Aware Mobile Robot Trajectories for Face-to-Face Interactions -- Vehicle-To-Pedestrian Communication Feedback Module: A Study on Increasing Legibility, Public Acceptance and Trust -- Let's run an online proxemics study! But, how do results compare to in-person? -- AR Point&Click: An Interface for Setting Robot Navigation Goals -- Human-Aware Subgoal Generation in Crowded Indoor Environments -- Speech-driven Robot Face Action Generation with Deep Generative Model for Social Robots -- Design of a Social Media Voice Assistant for Older Adults -- Migratable AI: Personalizing Dialog Conversations with Migration Context -- Generating Natural Language Responses in Robot-mediated Referential Communication Tasks to Simulate Theory of Mind -- Towards a Framework for Social Robot Co-speech Gesture Generation with Semantic Expression -- Tactile interaction with a robot leads to increased risk-taking -- AffectDisplay Recognition through Tactile and Visual Stimuli in a Social Robot -- Social robot perception and control capabilities -- Path-constrained Admittance Control of Human-Robot Interaction for Upper Limb Rehabilitation -- Causal Discovery of Dynamic Models for Predicting Human Spatial Interactions -- Learning User Habits to Enhance Robotic Daily-Living Assistance -- Multi-modal Data Fusion for People Perception in the Social Robot Haru -- Adaptive Behavior Generation of Social Robots Based on User Behavior Recognition -- A Transformer-based Approach for Choosing Actions in Social Robotics -- Deep Reinforcement Learning for the Autonomous Adaptive Behavior of Social Robots -- Share with Me: A Study on a Social Robot Collecting Mental Health Data -- Classification of personal data used by personalised robot companions based on concern of exposure -- Investigating non verbal interaction with Social robots -- Affective Human-Robot Interaction with Multimodal Explanations -- When to Help? A Multimodal Architecture for Recognizing When a User Needs Help from a Social Robot -- If You Are Careful, So Am I! How Robot Communicative Motions Can Influence Human Approach in a Joint Task -- Exploring Non-Verbal Strategies for Initiating an HRI -- On The Emotional Transparency of a Non-Humanoid Social Robot -- Transparent Interactive Reinforcement Learning using Emotional Behaviours -- What do I look like? A Conditional GAN Based Robot Facial Self-Awareness Approach -- Modeling and Evaluation of Human Motor Learning by Finger Manipulandum -- Motor Interference of Incongruent Hand Motions in HRI Depends on Movement Velocity -- Foster attention and engagement strategies in social robots -- Attributing intentionality to artificial agents: exposure versus interactive scenarios -- Does Embodiment and Interaction Affect the Adoption of the Intentional Stance Towards a Humanoid Robot? -- A case for the design of attention and gesture systems for social robots -- Introducing Psychology Strategies to increase Engagement on Social Robots -- Hey, robot! An investigation of getting robot's attention through touch -- Gaze Cueing and the Role of Presence in Human-Robot Interaction -- Special Session 1: Social Robotics Driven by Intelligent Perception and Endogenous Emotion-Motivation Core -- An Efficient Medicine Identification and Delivery System based on Mobile Manipulation Robot -- A Generative Adversarial Network Based Motion Planning Framework for Mobile Robots in Dynamic Human-Robot Integration Environments -- Research on 3D Face Reconstruction Based on Weakly Supervised Learning -- Robot differential behavioural expression in different scenarios -- Building an Affective Model for Social Robots with Customizable Personality -- A Multimodal Perception and Cognition Framework and its Application for Social Robots -- Indoor mobile robot socially concomitant navigation system -- NRTIRL Based NN-RRT* Path Planner in Human-RobotInteraction Environment -- Special Session 2: Adaptive behavioral models of robotic systems based on brain-inspired AI cognitive architectures -- Can I feel you? Recognizing human’s emotions during human-robot interaction -- A reinforcement learning framework to foster affective empathy in social robots -- Robotics Technology for Pain Treatment and Management: A Review -- Implications of Robot Backchannelling in Cognitive Therapy -- Prototyping an Architecture of Affective Robotic Systems Based on the Theory of Constructed Emotion -- A Named Entity Recognition Model for Manufacturing Process Based on the BERT Language Model Scheme.The two-volume set LNAI 13817 and 13818 constitutes the refereed proceedings of the 14th International Conference on Social Robotics, ICSR 2022, which took place in Florence, Italy, in December 2022. The 111 papers presented in the proceedings set were carefully reviewed and selected from 143 submissions. The contributions were organized in topical sections as follows: Social robot navigation and interaction capabilities (voice, tactile); Social robot perception and control capabilities; Investigating non verbal interaction with Social robots; Foster attention and engagement strategies in social robots; Special Session 1: Social Robotics Driven by Intelligent Perception and Endogenous Emotion-Motivation Core; Special Session 2: Adaptive behavioral models of robotic systems based on brain-inspired AI cognitive architectures; Advanced HRI capabilities for interacting with children; Social robots as advanced educational tool; Social robot applications in clinical and assistive scenarios; Collaborative social robots through dynamic game; Design and evaluate user’s robot perception and acceptance; Ethics, gender & trust in social robotics.Lecture Notes in Artificial Intelligence,2945-9141 ;13817Artificial intelligenceSocial sciencesData processingUser interfaces (Computer systems)Human-computer interactionComputer networksComputers, Special purposeComputer visionArtificial IntelligenceComputer Application in Social and Behavioral SciencesUser Interfaces and Human Computer InteractionComputer Communication NetworksSpecial Purpose and Application-Based SystemsComputer VisionArtificial intelligence.Social sciencesData processing.User interfaces (Computer systems)Human-computer interaction.Computer networks.Computers, Special purpose.Computer vision.Artificial Intelligence.Computer Application in Social and Behavioral Sciences.User Interfaces and Human Computer Interaction.Computer Communication Networks.Special Purpose and Application-Based Systems.Computer Vision.006.3303.4834Cavallo FilippoMiAaPQMiAaPQMiAaPQBOOK9910647776003321Social robotics2222514UNINA12583nam 22008295 450 991059103360332120251225203747.09783031147913303114791X10.1007/978-3-031-14791-3(MiAaPQ)EBC7080417(Au-PeEL)EBL7080417(CKB)24779143500041(PPN)264952669(BIP)85604509(BIP)85093108(DE-He213)978-3-031-14791-3(EXLCZ)992477914350004120220815d2022 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierSecurity and Cryptography for Networks 13th International Conference, SCN 2022, Amalfi (SA), Italy, September 12–14, 2022, Proceedings /edited by Clemente Galdi, Stanislaw Jarecki1st ed. 2022.Cham :Springer International Publishing :Imprint: Springer,2022.1 online resource (795 pages)Lecture Notes in Computer Science,1611-3349 ;13409Print version: Galdi, Clemente Security and Cryptography for Networks Cham : Springer International Publishing AG,c2022 9783031147906 Includes bibliographical references and index.Intro -- Preface -- Organization -- Invited Talks -- How to Do Cryptography Even When Cryptography Doesn't Exist -- From Galactic PCP Theory to Scaling Blockchains with ZK-STARKs -- Contents -- Ciphers, Cryptanalysis, Defenses -- Decoding McEliece with a Hint - Secret Goppa Key Parts Reveal Everything -- 1 Introduction -- 2 Preliminaries -- 3 Some Parts of a Secret Goppa Key Reveal Everything -- 3.1 Key Recovery from ALL Goppa Points -- 3.2 Goppa Polynomial Recovery from only tm+1 Goppa Points -- 3.3 Reconstruction of the Remaining Goppa Points -- 3.4 Full Key Recovery from tm+1 Goppa Points -- 4 Correcting Faulty Goppa Points -- References -- Cost-Asymmetric Memory Hard Password Hashing -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Related Work -- 2 Background and Notations -- 3 Defender's Model -- 4 Attacker's Model -- 4.1 Assumptions of Economics Analysis -- 4.2 Cracking Process -- 4.3 Attacker's Utility -- 4.4 Stackelberg Game -- 5 Computing the Attacker's Optimal Strategy -- 5.1 Marginal Utility -- 5.2 A Superset of the Optimal Checking Sequence -- 5.3 Extension by Concatenation -- 5.4 Local Search in Two Directions -- 5.5 Optimality Test and Globally Optimal Checking Sequence -- 6 Defender's Optimal Strategy -- 7 Experiments -- 7.1 Experiment Setup -- 7.2 Experiment Analysis and Discussion -- 8 Conclusion -- References -- .26em plus .1em minus .1emMemory-Hard Puzzles in the Standard Model with Applications to Memory-Hard Functions and Resource-Bounded Locally Decodable Codes -- 1 Introduction -- 1.1 Our Results -- 1.2 Prior Work -- 2 Technical Overview -- 2.1 Memory-Hard Languages -- 2.2 Memory-Hard Puzzles -- 2.3 Memory-Hard Functions from Memory-Hard Puzzles -- 2.4 Resource-Bounded LDCs from Cryptographic Puzzles -- References -- RAMus- A New Lightweight Block Cipher for RAM Encryption -- 1 Introduction -- 2 Preliminaries.3 The 2S-Strategy -- 3.1 Notations -- 3.2 The Round Function -- 4 The Description of RAMus -- 5 Design Rationale -- 6 Security Analysis of RAMus -- 6.1 Theoretical Proven Bound -- 6.2 SAT-Based Analysis -- 6.3 The Security of RAMus Against Integral Cryptanalysis and the Division Property Attacks -- 7 Performance -- References -- Higher-Order Masked Saber -- 1 Introduction -- 2 Preliminaries -- 2.1 Notation -- 2.2 Saber -- 2.3 uSaber -- 2.4 Fujisaki-Okamoto Transformation -- 2.5 Higher-Order Masking -- 3 Masking Saber -- 3.1 Arithmetic Operations -- 3.2 Compression -- 3.3 Masked Hashing -- 3.4 Masked Centered Binomial Sampler -- 3.5 Masked Comparison -- 4 Masking uSaber -- 5 Performance Evaluation -- 5.1 Performance Analysis of Comparison Algorithms for Saber -- 5.2 Performance Analysis for Masked Saber Decapsulation -- 5.3 Performance Analysis for Masked uSaber Decapsulation -- 5.4 Comparison with State-of-the-Art -- 6 Conclusions -- References -- Approximate Distance-Comparison-Preserving Symmetric Encryption -- 1 Introduction -- 1.1 Background and Motivation -- 1.2 Our Results -- 1.3 Discussion -- 1.4 Further Related Work -- 2 Preliminaries -- 3 Approximate Distance-Comparison-Preserving Functions and Their Properties -- 3.1 Notions Considered -- 3.2 Accuracy of Nearest Neighbors for -DCP Functions -- 3.3 Impossibility of Ideal Security -- 4 The Scale-and-Perturb (SAP) Scheme -- 4.1 Our Core -DCPE Scheme -- 4.2 Two Preprocessing Algorithms -- 5 Real-or-Replaced Indistinguishability for Neighboring Datasets -- 5.1 -RoR Security Bounds -- 6 Security Against Approximate Frequency-Finding Attacks -- 6.1 Window One-Wayness Security Notion -- 6.2 One-Wayness Bounds -- 6.3 Security Against Freq-Find Adversaries -- 7 Bit Security -- References -- Public Key Encryption -- Key-Policy ABE with Switchable Attributes -- 1 Introduction -- 1.1 Related Work.1.2 Contributions -- 2 Preliminaries -- 2.1 Dual Pairing Vector Spaces -- 2.2 Change of Basis -- 2.3 Particular Changes -- 3 Key-Policy ABE with Switchable Attributes -- 3.1 Policy Definition -- 3.2 Labeling of Access-Trees -- 3.3 Switchable Leaves and Attributes -- 3.4 Key-Policy Attribute-Based Encapsulation with Switchable Attributes -- 3.5 Security Notions -- 4 Our SA-KP-ABE Scheme -- 4.1 Description of Our KP-ABE with Switchable Attributes -- 4.2 Del-IND-Security of Our SA-KP-ABE for Encaps -- 4.3 Del-IND-Security of Our SA-KP-ABE for Encaps* -- 4.4 Distinct Indistinguishability Properties -- 4.5 Attribute-Indistinguishability -- 5 Application to Tracing -- 6 Conclusion -- References -- Mix-Nets from Re-randomizable and Replayable CCA-Secure Public-Key Encryption -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 2 Preliminaries -- 3 Definitions -- 4 Mix-Net -- 5 A Concrete Mix-Net Protocol from RCCA-PKE -- 5.1 Split PKE -- 5.2 A Protocol for Verify-then-Decrypt for Verifiable Split PKE -- 5.3 Our Concrete Verifiable Split PKE -- 5.4 Putting All Together -- References -- New and Improved Constructions for Partially Equivocable Public Key Encryption -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Technical Overview -- 2 Preliminaries -- 2.1 Reminders on Standard Assumptions -- 2.2 Non-Committing Encryption -- 3 PEPE Constructions -- 3.1 PEPE from LWE -- 3.2 PEPE from DDH -- 3.3 PEPE from Subgroup Decision -- References -- On Access Control Encryption Without Sanitization -- 1 Introduction -- 2 Our Results -- 2.1 Modeling ACE Without Sanitization -- 2.2 Instantiating ACEnoS and VACE -- 2.3 Concurrent Work -- 2.4 Future Directions -- 3 Access Control Encryption Without Sanitization -- 4 Linear ACE Without Sanitizer from PKE -- 5 Compact ACE from Hybrid Encryption -- 6 Game-Specific Obfuscation -- 7 ACE with Ciphertext Verifiability.7.1 Ciphertext Verifiability -- 7.2 VACE from Game Specific Obfuscation -- 7.3 No Secret Write Rule of VACE -- References -- Watermarkable Public Key Encryption with Efficient Extraction Under Standard Assumptions -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Technical Overview of Our Construction -- 1.3 Relations to Prior Work -- 2 Preliminaries -- 3 Watermarkable Public Key Encryption -- 4 Our Watermarkable PKE Scheme -- 5 Security Analysis -- 5.1 Encryption Correctness and IND-CPA Security -- 5.2 Extraction Correctness -- 5.3 Proving Unremovability and Unforgeability Properties -- References -- Authentication and Signatures -- A Provably Secure, Lightweight Protocol for Anonymous Authentication -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Outline of the Paper -- 2 Model and Definitions -- 2.1 Preliminaries -- 2.2 Desynchronization Resilience -- 2.3 Mutual Authentication -- 2.4 Tag Anonymity -- 3 Protocol Description -- 4 Proofs of Security -- 4.1 Mutual Authentication -- 4.2 Desynchronization Resilience -- 4.3 Tag Anonymity -- References -- Anonymous Authenticated Communication -- 1 Introduction -- 1.1 Background and Motivation -- 1.2 Related Work -- 1.3 Contributions -- 1.4 Outline -- 2 Preliminaries -- 2.1 Notation -- 2.2 Constructive Cryptography -- 2.3 Anonymous and Authentic Resources -- 3 Achieving Anonymous Authenticity -- 3.1 Game-Based Security of Bilateral Signatures -- 3.2 Composable Security of Bilateral Signatures -- 4 Achieving De-anonymizable Authenticity -- 4.1 Game-Based Security of Partial Signatures -- 4.2 Composable Security of Partial Signatures -- 5 Achieving Receiver-Side Anonymous Authenticity -- 5.1 Game-Based Security of Ring Signatures -- 5.2 Composable Security of Ring Signatures -- 6 Concluding Remarks and Future Work -- References -- Credential Transparency System -- 1 Introduction.1.1 Definitional Framework for Diverse Credential Systems -- 2 Credential Transparency System (CTS) -- 2.1 Security Properties -- 3 CTS Construction -- 3.1 Overview of Our Construction -- 3.2 Construction Description -- 3.3 Simulation Algorithms -- 4 Security Proof -- 4.1 Intuition for the Proof of Soundness -- 4.2 Intuition for the Proof of Privacy -- References -- Cumulatively All-Lossy-But-One Trapdoor Functions from Standard Assumptions -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Technical Overview -- 1.3 Related Work -- 2 Background -- 2.1 Cumulatively All-Lossy-But-One Trapdoor Functions -- 2.2 Lattices -- 2.3 Composite Residuosity -- 3 Cumulatively All-Lossy-But-One Trapdoor Functions -- 3.1 Relaxed CALBO-TDFs from LWE -- 3.2 CALBO-TDFs from DCR -- References -- On the Related-Key Attack Security of Authenticated Encryption Schemes -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 2 Preliminaries -- 2.1 Notation -- 2.2 Primitives -- 2.3 Security Notions Against Related-Key Attacks -- 3 RKA Security Notions for Nonce-Based AEAD -- 3.1 Nonce Selection -- 3.2 RKA-Security Notions for AEAD Schemes -- 3.3 RKA-Security Against Nonce Misuse -- 3.4 RKA-Security Notions for Encryption -- 4 RKA Security of the N1, N2, and N3 Constructions -- 4.1 N1 - Instantiation of Encrypt-and-MAC -- 4.2 N2 - Instantiation of Encrypt-then-MAC -- 4.3 N3 - Instantiation of MAC-then-Encrypt -- 5 RKA Nonce-Misuse-Resistant AEAD -- References -- The State of the Union: Union-Only Signatures for Data Aggregation -- 1 Introduction -- 2 Syntax -- 3 Security Definitions -- 3.1 Notation -- 3.2 Unforgeability -- 3.3 History Hiding -- 4 A UOS Scheme -- 4.1 Initial Construction -- 4.2 Secure Variant from Groups of Unknown Order -- 4.3 Secure Variant from Lattices -- 4.4 Security Analysis -- 5 Performance -- 6 Conclusion -- References.Traceable Constant-Size Multi-authority Credentials.This book constitutes the proceedings of the 13th International Conference on Security and Cryptography for Networks, SCN 2022, held in Amalfi, Italy, in September 2022. The 33 full papers presented in this volume were carefully reviewed and selected from 101 submissions. They are organized in topical sections: Ciphers, Cryptanalysis, Defenses; Public Key Encryption; Authentication and Signatures, Multiparty Computation; Zero-Knowledge Proofs and Applications.Lecture Notes in Computer Science,1611-3349 ;13409CryptographyData encryption (Computer science)Application softwareData protectionComputer networksSecurity measuresComputer networksCryptologyComputer and Information Systems ApplicationsSecurity ServicesMobile and Network SecurityComputer Communication NetworksCryptography.Data encryption (Computer science)Application software.Data protection.Computer networksSecurity measures.Computer networks.Cryptology.Computer and Information Systems Applications.Security Services.Mobile and Network Security.Computer Communication Networks.005.82005.824Galdi ClementeJarecki StanisławMiAaPQMiAaPQMiAaPQBOOK9910591033603321Security and Cryptography for Networks2912219UNINA