scispace - formally typeset
Search or ask a question
Author

Carole Preston

Bio: Carole Preston is an academic researcher from Louisiana State University in Shreveport. The author has contributed to research in topics: Library management & Digital library. The author has an hindex of 1, co-authored 1 publications receiving 3 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: Issues relating to database technology and digital libraries are reviewed and some of major challenges in digital libraries and managerial issues are identified.
Abstract: Database technology advancements have provided many opportunities for libraries. These advancements can bring the world closer together through information accessibility. Digital library projects have been established worldwide to, ultimately, fulfil the needs of end users through more efficiency and convenience. Resource sharing will continue to be the trend for libraries. Changes often create issues which need to be addressed In this paper, issues relating to database technology and digital libraries are reviewed. Some of major challenges in digital libraries and managerial issues are identified as well.

3 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The typical encryption schemes including single-key homomorphic encryption scheme and public key homomorphicryption scheme are described and their application in the field of security is elaborate, including the applications in database security, secure multi-party computation and the Internet of things.
Abstract: Homomorphic encryption scheme allows one to directly operate ciphertext without being able to decrypt and it has a wide application prospect. In this article we describe the typical encryption schemes including single-key homomorphic encryption scheme and public key homomorphic encryption scheme and then elaborate its application in the field of security, including the applications in database security, secure multi-party computation and the Internet of things. Finally, we discuss the research direction of homomorphic encryption.

6 citations