Hash functions can be leveraged to ensure ________.
(1)Availability
(2)Confidentiality
(3)Authentication
(4)Integrity