• A Authentication
  • B Authorization
  • C Encryption
  • D Decryption