The Journal of Telecommunication Systems & Management is a peer-reviewed, open-access journal. The early efforts towards network security were started with the initiation of Secure Network Programming API that resembled the computing interface Berkley socket. A motivated attempt towards network security could be credited to Secure Sockets Layer Protocol. It was then replaced by Transport Layer Security 1.0 that included small improvements compared to SSL, strengthening the degree of security. Since then, TLS emerged as a preferred protocol for network security. Apart from the necessary requirement of every network to retain and prioritize privacy, industries such as e-commerce and asset management that deal with the protection of sensitive, financial information and secure operation, were the reasons due to which TLS has gained recognition widespread use. The TLS protocol uses session IDs to communicate with the client and the server. For every forward and backward communication, TLS uses several layers of confirmation codes and keys to authenticate and prevent miscommunication of the information. A single TLS session, consists of the following parameters: Content type, Version, Length, Protocol Messages, MAC and padding, Handshake protocol, Message type, Handshake message data length, Alert protocol, Level, Description, ChanCipherSpec Protocol, CCS protocol type and Application protocol. Peer review refers to the work done during the screening of submitted manuscripts and funding applications. This process encourages authors to meet the accepted standards of their discipline and reduces the dissemination of irrelevant findings, unwarranted claims, unacceptable interpretations, and personal views. Publications that have not undergone peer review are likely to be regarded with suspicion by academic scholars and professionals.
Last date updated on June, 2014