. . . "In yet another example, one or more steps may be eliminated, such as if the access point and the device do not use all of the security parameters described with respect to FIG. 8." .