Dr. Abayomi Joshua Jegede

Associate Professor
University of Jos, Nigeria


Highest Degree
Ph.D. in Security in Computing from Universiti Putra Malaysia, Malaysia

Share this Profile

Area of Interest:

Computer Sciences
Information Technology
Computer Applications
Computer Security
Networking

Selected Publications

  1. Jegede, A., N.I. Udzir, A. Abdullah and R. Mahmod, 2018. Revocable and non-invertible multibiometric template protection based on matrix transformation. Pertanika J. Sci. Technol., 26: 133-160.
    Direct Link  |  

  2. Jegede, A., N.I. Udzir, A. Abdullah and R. Mahmod, 2017. State of the art in biometric key binding and key generation schemes. Int. J. Commun. Networks Inform. Secur., 9: 333-344.
    Direct Link  |  

  3. Jegede, A., N.I. Udzir, A. Abdullah and R. Mahmod, 2017. Modified shielding function for multibiometric authentication and template protection. ESTEEM Acad. J., 13: 118-128.
    Direct Link  |  

  4. Jegede, A., N.I. Udzir, A. Abdullah and R. Mahmod, 2017. Cancelable and hybrid biometric cryptosystems: Current directions and open research issues. Int. J. Adv. Applied Sci., 4: 65-77.
    CrossRef  |  Direct Link  |  

  5. Jegede, A., N.I. Udzir, A. Abdullah and R. Mahmod, 2015. Face recognition and template protection with shielding function. Int. J. Security Applic., 9: 149-164.
    CrossRef  |  

  6. Adegoke, G.K., G.I.O. Aimufua and A.J. Jegede, 2012. Computer modelling and simulation for inventory control. Res. J. Applied Sci. Eng. Technol., 4: 1828-1832.
    Direct Link  |  

  7. Adegoke, G.K., G.I.O. Aimufua and A.J. Jegede, 2012. A survey of Fortran, Pascal and C programming languages. J. Nat. Applied Sci., 2: 39-44.

  8. Akosu, N.I., A.J. Jegede and G.K. Adegoke, 2011. Evaluating the usability of online institutional portals: The Nigerian perspective. J. Ultra Comput. Inform. Technol., 2: 47-62.

  9. Jegede, A.J., G.I.O. Aimufua and N.I. Akosu, 2009. Electronic voting: A panacea for electoral irregularities in developing countries. J. Mobile Commun., 307: 22-33.
    CrossRef  |  Direct Link  |  

  10. Jegede, A.J., G.I.O. Aimufua and H.O. Salami, 2007. Information security policy: Relevance, creation and enforcement. Int. J. Soft Comput., 2: 408-410.
    Direct Link  |  

  11. Jegede, A.J., G.I.O. Aimufua and H.O. Salami, 2007. A specification of an application gateway for client/server systems. Asia J. Inform. Technol., 6: 847-853.
    CrossRef  |  Direct Link  |  

  12. Jegede, A.J. and H.O. Salami, 2007. A cryptographic model with intrusion detection capability. J. Ultra Sci. Phys. Sci., 19: 291-302.

  13. Jegede, A.J. and G.I.O. Aimufua, 2007. An overview of information security techniques. Indian J. Multidisciplinary Res., 5: 251-260.

  14. Jegede, A.J. and G.I.O. Aimufua, 2007. A roadmap for securing an information system enterprise. J. Res. Phys. Sci., 3: 21-25.

  15. Jegede, A.J. and G.I.O. Aimufua, 2007. Implementing an application gateway for client/server systems. Asia J. Inform. Technol., 6: 1105-1109.
    CrossRef  |  Direct Link  |  

  16. Akosu, N.I., A.J. Jegede and G.K. Adegoke, 2007. Useful benchmarks for evaluating the usability of online portals and processes. Indian J. Multidisciplinary Res., 5: 363-372.

  17. Jegede, A.J., 2006. Deploying information and communication technology for sustainable economic development: The electronic commerce perspective. J. Scient. Ind. Stud., 4: 1-7.