"techniques such as authentication, encryption, Secure Sockets Layer (???SSL???), Public Key Infrastructure (???PKI???), Kerberos, True Random Number Generators (for generating secret keys with maximum entropy), hopping keys (constantly changing keys), 128-bit Wired Equivalent Privacy (???WEP???) algorithm, etc." . . . .