[1]
S. Ali and B. Djaouida, “Optimizing Quantum Key Distribution Protocols using Decoy State Techniques and Experimental Validation”, Eng. Technol. Appl. Sci. Res., vol. 14, no. 4, pp. 15133–15140, Aug. 2024.