• Using Key Encryption
  • Using Mnemonics