. . "FIG. 2 is a flowchart illustrating a method for using paired secrets in a secured wireless network." . .