The _________________________________ mechanism helps mitigate the malicious intermediary, insufficient authorization, and overlapping trust boundaries security threats. A. Encryption B. Hashing C. Digital Signature D. Public Key Infrastructure (PKI)