Different target transmit powers are determined for different wireless
transmissions from a wireless device, the different transmissions having
different security requirements. For example, the security requirements
of a particular transmission may include a security ranking of a device
to which one or more frames carried by the particular transmission are
addressed. In another example, the security requirements of a particular
transmission may include the confidentiality of data carried by the
particular transmission.