[1]
S. Ali and B. Djaouida, “Optimizing Quantum Key Distribution Protocols using Decoy State Techniques and Experimental Validation”,
Eng. Technol. Appl. Sci. Res.
, vol. 14, no. 4, pp. 15133–15140, Aug. 2024.