Which of the following secure protocols is the developer MOST likely to use?