Dr. Abayomi Joshua Jegede
My Social Links

Dr. Abayomi Joshua Jegede

Associate Professor
University of Jos, Nigeria


Highest Degree
Ph.D. in Security in Computing from Universiti Putra Malaysia, Malaysia

Share this Profile

Area of Interest:

Computer Sciences
100%
Information Technology
62%
Computer Applications
90%
Computer Security
75%
Networking
55%

Research Publications in Numbers

Books
2
Chapters
2
Articles
35
Abstracts
0

Selected Publications

  1. Jegede, A., N.I. Udzir, A. Abdullah and R. Mahmod, 2018. Revocable and non-invertible multibiometric template protection based on matrix transformation. Pertanika J. Sci. Technol., 26: 133-160.
    Direct Link  |  
  2. Jegede, A., N.I. Udzir, A. Abdullah and R. Mahmod, 2017. State of the art in biometric key binding and key generation schemes. Int. J. Commun. Networks Inform. Secur., 9: 333-344.
    Direct Link  |  
  3. Jegede, A., N.I. Udzir, A. Abdullah and R. Mahmod, 2017. Modified shielding function for multibiometric authentication and template protection. ESTEEM Acad. J., 13: 118-128.
    Direct Link  |  
  4. Jegede, A., N.I. Udzir, A. Abdullah and R. Mahmod, 2017. Cancelable and hybrid biometric cryptosystems: Current directions and open research issues. Int. J. Adv. Applied Sci., 4: 65-77.
    CrossRef  |  Direct Link  |  
  5. Jegede, A., N.I. Udzir, A. Abdullah and R. Mahmod, 2015. Face recognition and template protection with shielding function. Int. J. Security Applic., 9: 149-164.
    CrossRef  |  
  6. Adegoke, G.K., G.I.O. Aimufua and A.J. Jegede, 2012. Computer modelling and simulation for inventory control. Res. J. Applied Sci. Eng. Technol., 4: 1828-1832.
    Direct Link  |  
  7. Adegoke, G.K., G.I.O. Aimufua and A.J. Jegede, 2012. A survey of Fortran, Pascal and C programming languages. J. Nat. Applied Sci., 2: 39-44.
  8. Akosu, N.I., A.J. Jegede and G.K. Adegoke, 2011. Evaluating the usability of online institutional portals: The Nigerian perspective. J. Ultra Comput. Inform. Technol., 2: 47-62.
  9. Jegede, A.J., G.I.O. Aimufua and N.I. Akosu, 2009. Electronic voting: A panacea for electoral irregularities in developing countries. J. Mobile Commun., 307: 22-33.
    CrossRef  |  Direct Link  |  
  10. Jegede, A.J., G.I.O. Aimufua and H.O. Salami, 2007. Information security policy: Relevance, creation and enforcement. Int. J. Soft Comput., 2: 408-410.
    Direct Link  |  
  11. Jegede, A.J., G.I.O. Aimufua and H.O. Salami, 2007. A specification of an application gateway for client/server systems. Asia J. Inform. Technol., 6: 847-853.
    CrossRef  |  Direct Link  |  
  12. Jegede, A.J. and H.O. Salami, 2007. A cryptographic model with intrusion detection capability. J. Ultra Sci. Phys. Sci., 19: 291-302.
  13. Jegede, A.J. and G.I.O. Aimufua, 2007. An overview of information security techniques. Indian J. Multidisciplinary Res., 5: 251-260.
  14. Jegede, A.J. and G.I.O. Aimufua, 2007. A roadmap for securing an information system enterprise. J. Res. Phys. Sci., 3: 21-25.
  15. Jegede, A.J. and G.I.O. Aimufua, 2007. Implementing an application gateway for client/server systems. Asia J. Inform. Technol., 6: 1105-1109.
    CrossRef  |  Direct Link  |  
  16. Akosu, N.I., A.J. Jegede and G.K. Adegoke, 2007. Useful benchmarks for evaluating the usability of online portals and processes. Indian J. Multidisciplinary Res., 5: 363-372.
  17. Jegede, A.J., 2006. Deploying information and communication technology for sustainable economic development: The electronic commerce perspective. J. Scient. Ind. Stud., 4: 1-7.