• A Encryption
  • B Identification
  • C Authentication
  • D Authorization