{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T18:35:42Z","timestamp":1775154942699,"version":"3.50.1"},"reference-count":82,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2017,8,30]],"date-time":"2017-08-30T00:00:00Z","timestamp":1504051200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"SGS grant; VSB Technical University of Ostrava","award":["SP2017\/174"],"award-info":[{"award-number":["SP2017\/174"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s11128-017-1702-z","type":"journal-article","created":{"date-parts":[[2017,8,30]],"date-time":"2017-08-30T15:09:05Z","timestamp":1504105745000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":66,"title":["Implementation of quantum key distribution network simulation module in the network simulator NS-3"],"prefix":"10.1007","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2697-1756","authenticated-orcid":false,"given":"Miralem","family":"Mehic","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Oliver","family":"Maurhart","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stefan","family":"Rass","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Miroslav","family":"Voznak","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,8,30]]},"reference":[{"key":"1702_CR1","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","volume":"560","author":"CH Bennett","year":"2011","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560, 7\u201311 (2011)","journal-title":"Theor. Comput. Sci."},{"issue":"P1","key":"1702_CR2","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.tcs.2014.09.018","volume":"560","author":"R Alleaume","year":"2014","unstructured":"Alleaume, R., Branciard, C., Bouda, J., Debuisschert, T., Dianati, M., Gisin, N., Godfrey, M., Grangier, P., Langer, T., Lutkenhaus, N., Monyk, C., Painchault, P., Peev, M., Poppe, A., Pornin, T., Rarity, J., Renner, R., Ribordy, G., Riguidel, M., Salvail, L., Shields, A., Weinfurter, H., Zeilinger, A.: Using quantum key distribution for cryptographic purposes: a survey. Theor. Comput. Sci. 560(P1), 62\u201381 (2014)","journal-title":"Theor. Comput. Sci."},{"key":"1702_CR3","doi-asserted-by":"crossref","unstructured":"Maurer, U.: Information-theoretically secure secret-key agreement by NOT authenticated public discussion. In: Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1233, 209\u2013225 (1997)","DOI":"10.1007\/3-540-69053-0_15"},{"key":"1702_CR4","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, vol. 175, p. 8. New York (1984)"},{"key":"1702_CR5","unstructured":"Renner, R.: Security of quantum key distribution. Ph.D. thesis, Swiss Federal Institute of Technology Zurich (2005)"},{"key":"1702_CR6","unstructured":"Alleaume, R., Bouda, J., Branciard, C., Debuisschert, T., Dianati, M., Gisin, N., Godfrey, M., Grangier, P., Langer, T., Leverrier, A., Lutkenhaus, N., Painchault, P., Peev, M., Poppe, A., Pornin, T., Rarity, J., Renner, R., Ribordy, G., Riguidel, M., Salvail, L., Shields, A., Weinfurter, H., Zeilinger, A.: SECOQC White Paper on Quantum Key Distribution and Cryptography, p. 28. arXiv preprint arXiv:quant-ph\/0701168 (2007)"},{"key":"1702_CR7","unstructured":"Elliott, C., Yeh, H.: DARPA quantum network testbed. Technical Report July, BBN Technologies Cambridge, New York, USA (2007)"},{"issue":"17","key":"1702_CR8","doi-asserted-by":"crossref","first-page":"2991","DOI":"10.1007\/s11434-009-0526-3","volume":"54","author":"FX Xu","year":"2009","unstructured":"Xu, F.X., Chen, W., Wang, S., Yin, Z.Q., Zhang, Y., Liu, Y., Zhou, Z., Zhao, Y.B., Li, H.W., Liu, D., Han, Z.F., Guo, G.C.: Field experiment on a robust hierarchical metropolitan quantum cryptography network. Chin. Sci. Bull. 54(17), 2991\u20132997 (2009)","journal-title":"Chin. Sci. Bull."},{"issue":"11","key":"1702_CR9","doi-asserted-by":"crossref","first-page":"10387","DOI":"10.1364\/OE.19.010387","volume":"19","author":"M Sasaki","year":"2011","unstructured":"Sasaki, M., Fujiwara, M., Ishizuka, H., Klaus, W., Wakui, K., Takeoka, M., Miki, S., Yamashita, T., Wang, Z., Tanaka, A., Yoshino, K.: Field test of quantum key distribution in the Tokyo QKD network. Opt. Express 19(11), 10387\u201310409 (2011)","journal-title":"Opt. Express"},{"issue":"18","key":"1702_CR10","doi-asserted-by":"crossref","first-page":"21739","DOI":"10.1364\/OE.22.021739","volume":"22","author":"S Wang","year":"2014","unstructured":"Wang, S., Chen, W., Yin, Z.Q., Li, H.W., He, D.Y., Li, Y.H., Zhou, Z., Song, X.T., Li, F.Y., Wang, D., Chen, H., Han, Y.G., Huang, J.Z., Guo, J.F., Hao, P.L., Li, M., Zhang, C.M., Liu, D., Liang, W.Y., Miao, C.H., Wu, P., Guo, G.C., Han, Z.F.: Field and long-term demonstration of a wide area quantum key distribution network. Opt. Express 22(18), 21739 (2014)","journal-title":"Opt. Express"},{"issue":"6343","key":"1702_CR11","doi-asserted-by":"crossref","first-page":"1140","DOI":"10.1126\/science.aan3211","volume":"356","author":"J Yin","year":"2017","unstructured":"Yin, J., Cao, Y., Li, Y.H., Liao, S.K., Zhang, L., Ren, J.G., Al, W.Q.C., Liu, W.Y., Bo Li, H.D., Li, G.B., Lu, Q.M., Gong, Y.H., Xu, Y., Li, S.L., Li, F.Z., Yin, Y.Y., Jiang, Z.Q., Li, M., Jia, J.J., Ge Ren, D.H., Zhou, Y.L., Zhang, X.X., Wang, N., Chang, X., Zhu, Z.C., Liu, N.L., Chen, Y.A., Lu, C.Y., Shu, R., Peng, C.Z., Wang, J.Y., Pan, J.W.: Satellite-based entanglement distribution over 1200 kilometers. Science 356(6343), 1140\u20131144 (2017)","journal-title":"Science"},{"issue":"4","key":"1702_CR12","first-page":"413","volume":"14","author":"M Mehic","year":"2016","unstructured":"Mehic, M., Fazio, P., Voznak, M., Chromy, E.: Toward designing a quantum key distrubution network. Adv. Electr Electron. Eng. 14(4), 413\u2013420 (2016)","journal-title":"Adv. Electr Electron. Eng."},{"key":"1702_CR13","unstructured":"Henderson, T.R., Riley, G.F.: Network simulations with the ns-3 simulator. In: Proceedings of Sigcomm, pp. 527 (2006)"},{"key":"1702_CR14","doi-asserted-by":"publisher","unstructured":"Kollmitzer, C., Pivk, M. (eds.): Applied Quantum Cryptography. Lecture Notes in Physics, vol. 797. Springer, Berlin Heidelberg (2010). doi: 10.1007\/978-3-642-04831-9","DOI":"10.1007\/978-3-642-04831-9"},{"key":"1702_CR15","doi-asserted-by":"crossref","unstructured":"Dianati, M., Alleaume, R.: Architecture of the Secoqc quantum key distribution network. In: 2007 First International Conference on Quantum, Nano, and Micro Technologies (ICQNM\u201907), IEEE, pp. 13\u201313, Jan 2007","DOI":"10.1109\/ICQNM.2007.3"},{"key":"1702_CR16","doi-asserted-by":"crossref","unstructured":"Mehic, M., Maurhart, O., Rass, S., Komosny, D., Rezac, F., Voznak, M.: Analysis of the public channel of quantum key distribution link. IEEE J. Quantum Electron. (2017, in press)","DOI":"10.1109\/JQE.2017.2740426"},{"issue":"2","key":"1702_CR17","doi-asserted-by":"crossref","first-page":"1576","DOI":"10.1364\/OE.22.001576","volume":"22","author":"A Ciurana","year":"2014","unstructured":"Ciurana, A., Martinez-Mateo, J., Peev, M., Poppe, A., Walenta, N., Zbinden, H., Martin, V.: Quantum metropolitan optical network based on wavelength division multiplexing. Opt. Express 22(2), 1576\u201393 (2014)","journal-title":"Opt. Express"},{"key":"1702_CR18","doi-asserted-by":"crossref","unstructured":"Aleksic, S., Winkler, D., Franzl, G., Poppe, A., Schrenk, B., Hipp, F.: Quantum key distribution over optical access networks. In: Proceedings of the 2013 18th European Conference on Network and Optical Communications and 2013 8th Conference on Optical Cabling and Infrastructure (NOC-OC&I), pp. 11\u201318. (2013)","DOI":"10.1109\/NOC-OCI.2013.6582861"},{"issue":"7","key":"1702_CR19","doi-asserted-by":"crossref","first-page":"075002","DOI":"10.1088\/1367-2630\/11\/7\/075002","volume":"11","author":"R Alleaume","year":"2009","unstructured":"Alleaume, R., Roueff, F., Diamanti, E., Lutkenhaus, N.: Topological optimization of quantum key distribution networks. N. J. Phys. 11(7), 075002 (2009)","journal-title":"N. J. Phys."},{"issue":"1","key":"1702_CR20","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74(1), 145\u2013195 (2002)","journal-title":"Rev. Mod. Phys."},{"issue":"1","key":"1702_CR21","doi-asserted-by":"crossref","first-page":"61","DOI":"10.3233\/JCS-2010-0373","volume":"18","author":"L Salvail","year":"2010","unstructured":"Salvail, L., Peev, M., Diamanti, E., All\u00e9aume, R., L\u00fctkenhaus, N., L\u00e4nger, T.: Security of trusted repeater quantum key distribution networks. J. Comput. Secur. 18(1), 61\u201387 (2010)","journal-title":"J. Comput. Secur."},{"issue":"3","key":"1702_CR22","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Du\u0161ek, M., L\u00fctkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81(3), 1301\u20131350 (2009)","journal-title":"Rev. Mod. Phys."},{"key":"1702_CR23","unstructured":"Du\u0161ek, M., L\u00fctkenhaus, N., Hendrych, M.: Quantum cryptography. In: Progress in Optics, vol.\u00a049, pp.\u00a0381\u2013454 (2006). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0079663806490053"},{"issue":"2010","key":"1702_CR24","first-page":"2008","volume":"96","author":"AR Dixon","year":"2010","unstructured":"Dixon, A.R., Yuan, Z.L., Dynes, J.F., Sharpe, A.W., Shields, A.J.: Continuous operation of high bit rate quantum key distribution. Appl. Phys. Lett. 96(2010), 2008\u20132011 (2010)","journal-title":"Appl. Phys. Lett."},{"issue":"3","key":"1702_CR25","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1038\/nphoton.2014.327","volume":"9","author":"B Korzh","year":"2015","unstructured":"Korzh, B., Lim, C.C.W., Houlmann, R., Gisin, N., Li, M.J., Nolan, D., Sanguinetti, B., Thew, R., Zbinden, H.: Provably secure and practical quantum key distribution over 307 km of optical fibre. Nat. Photon. 9(3), 163\u2013168 (2015)","journal-title":"Nat. Photon."},{"key":"1702_CR26","doi-asserted-by":"crossref","unstructured":"Sasaki, M.: Tokyo QKD network and the evolution to secure photonic network. In: CLEO:2011\u2014Laser Applications to Photonic Applications, vol.\u00a01., p. JTuC1. OSA, Washington, D.C. (2011)","DOI":"10.1364\/CLEO_AT.2011.JTuC1"},{"issue":"6","key":"1702_CR27","doi-asserted-by":"crossref","first-page":"1008","DOI":"10.1364\/OL.37.001008","volume":"37","author":"S Wang","year":"2012","unstructured":"Wang, S., Chen, W., Guo, J.F., Yin, Z.Q., Li, H.W., Zhou, Z., Guo, G.C., Han, Z.F.: 2 GHz clock quantum key distribution over 260 km of standard telecom fiber. Opt. Lett. 37(6), 1008 (2012)","journal-title":"Opt. Lett."},{"issue":"1","key":"1702_CR28","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1002\/sec.13","volume":"1","author":"M Dianati","year":"2008","unstructured":"Dianati, M., All, R., All\u00e9aume, R., Gagnaire, M., Shen, X.S.: Architecture and protocols of the future European quantum key distribution network. Secur. Commun. Netw. 1(1), 57\u201374 (2008)","journal-title":"Secur. Commun. Netw."},{"issue":"6","key":"1702_CR29","doi-asserted-by":"crossref","first-page":"81","DOI":"10.5755\/j01.eie.21.6.13768","volume":"21","author":"M Mehic","year":"2015","unstructured":"Mehic, M., Niemiec, M., Voznak, M.: Calculation of the key length for quantum key distribution. Elektron. ir Elektrotech. 21(6), 81\u201385 (2015)","journal-title":"Elektron. ir Elektrotech."},{"key":"1702_CR30","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1088\/1367-2630\/4\/1\/346","volume":"4","author":"C Elliott","year":"2002","unstructured":"Elliott, C.: Building the quantum network. N. J. Phys. 4, 346 (2002)","journal-title":"N. J. Phys."},{"key":"1702_CR31","unstructured":"Abidin, A., Larsson, J.\u00c5.:Security of Authentication with a Fixed Key in Quantum Key Distribution, p. 14 (2011)"},{"issue":"7","key":"1702_CR32","doi-asserted-by":"crossref","first-page":"4383","DOI":"10.1109\/TIT.2014.2317312","volume":"60","author":"C Portmann","year":"2014","unstructured":"Portmann, C.: Key recycling in authentication. IEEE Trans. Inf. Theory 60(7), 4383\u20134396 (2014)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"7","key":"1702_CR33","first-page":"25006","volume":"G36","author":"W Hao","year":"2009","unstructured":"Hao, W., Zheng-Fu, H., Guang-Can, G., Pei-Lin, H.: The queueing model for quantum key distribution network. J. Phys. G G36(7), 25006 (2009)","journal-title":"J. Phys. G"},{"issue":"11","key":"1702_CR34","first-page":"9","volume":"2","author":"S Konig","year":"2011","unstructured":"Konig, S., Rass, S.: On the transmission capacity of quantum networks. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 2(11), 9\u201316 (2011)","journal-title":"Int. J. Adv. Comput. Sci. Appl. (IJACSA)"},{"issue":"1","key":"1702_CR35","first-page":"22","volume":"5","author":"S Rass","year":"2012","unstructured":"Rass, S., K\u00f6nig, S.: Turning quantum cryptography against itself: how to avoid indirect eavesdropping in quantum networks by passive and active adversaries. Int. J. Adv. Syst. Meas. 5(1), 22\u201333 (2012)","journal-title":"Int. J. Adv. Syst. Meas."},{"key":"1702_CR36","doi-asserted-by":"crossref","first-page":"735","DOI":"10.1080\/09500340412331283633","volume":"52","author":"D Collins","year":"2005","unstructured":"Collins, D., Gisin, N., de Riedmatten, H.: Quantum relays for long-distance quantum cryptography. J. Mod. Opt. 52, 735\u2013753 (2005)","journal-title":"J. Mod. Opt."},{"issue":"1","key":"1702_CR37","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1103\/PhysRevA.59.169","volume":"59","author":"W Dur","year":"1999","unstructured":"Dur, W., Briegel, H.J., Cirac, J.I., Zoller, P.: Quantum repeaters based on entanglement purification. Phys. Rev. A 59(1), 169\u2013181 (1999)","journal-title":"Phys. Rev. A"},{"issue":"7208","key":"1702_CR38","doi-asserted-by":"crossref","first-page":"1098","DOI":"10.1038\/nature07241","volume":"454","author":"ZS Yuan","year":"2008","unstructured":"Yuan, Z.S., Chen, Y.A., Zhao, B., Chen, S., Schmiedmayer, J., Pan, J.W.: Experimental demonstration of a BDCZ quantum repeater node. Nature 454(7208), 1098\u20131101 (2008)","journal-title":"Nature"},{"issue":"2","key":"1702_CR39","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1142\/S0219749908003529","volume":"6","author":"A Poppe","year":"2008","unstructured":"Poppe, A., Peev, M., Maurhart, O.: Outline of the SECOQC quantum-key-distribution network in Vienna. J. Quantum Inf. 6(2), 10 (2008)","journal-title":"J. Quantum Inf."},{"key":"1702_CR40","doi-asserted-by":"crossref","unstructured":"Sergienko, A.V. (ed.): Quantum Communications and Cryptography, Optical Science and Engineering, 1st edn. CRC Press, Boca Raton (2005)","DOI":"10.1201\/9781420026603"},{"key":"1702_CR41","unstructured":"Marhoefer, M.,Wimberger, I., Poppe, A.: Applicability of Quantum Cryptography for Securing Mobile Communication Networks (2006). https:\/\/pdfs.semanticscholar.org\/53a8\/4df168139553023c95f11967b0e2462bd6bd.pdf"},{"key":"1702_CR42","first-page":"610","volume-title":"Lecture Notes in Computer Science. Volume 4393 of Lecture Notes in Computer Science","author":"M Hayashi","year":"2007","unstructured":"Hayashi, M., Iwama, K., Nishimura, H., Raymond, R., Yamashita, S.: Quantum network coding. In: Thomas, W., Weil, P. (eds.) Lecture Notes in Computer Science. Volume 4393 of Lecture Notes in Computer Science, pp. 610\u2013621. Springer, Berlin (2007)"},{"key":"1702_CR43","doi-asserted-by":"crossref","unstructured":"Schartner, P., Rass, S., Schaffer, M.: Quantum key management. In: Applied Cryptography and Network Security. InTech (2012)","DOI":"10.5772\/35400"},{"issue":"1","key":"1702_CR44","first-page":"66","volume":"32","author":"D Andersen","year":"2001","unstructured":"Andersen, D., Balakrishnan, H., Kaashoek, F., Morris, R.: Resilient overlay networks. Sosp 32(1), 66 (2001)","journal-title":"Sosp"},{"key":"1702_CR45","unstructured":"Rekhter, Y., Li, T., Hares, S.: A Border Gateway Protocol 4 (BGP-4), No. RFC 4271 (2005). http:\/\/www.rfc-editor.org\/rfc\/rfc4271.txt"},{"key":"1702_CR46","doi-asserted-by":"crossref","unstructured":"Labovitz, C., Ahuja, A., Wattenhofer, R., Venkatachary, S.: The impact of internet policy and topology on delayed routing convergence. In: Proceedings IEEE INFOCOM 2001, Conference on Computer Communications, Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213), vol. 1, pp. 537\u2013546. (2001)","DOI":"10.1109\/INFCOM.2001.916775"},{"key":"1702_CR47","doi-asserted-by":"crossref","unstructured":"Chun, B.G., Fonseca, R., Stoica, I., Kubiatowicz, J.: Characterizing selfishly constructed overlay routing networks. In: IEEE INFOCOM 2004, IEEE, vol.\u00a02., pp. 1329\u20131339. (2004)","DOI":"10.1109\/INFCOM.2004.1357018"},{"key":"1702_CR48","doi-asserted-by":"crossref","unstructured":"Lee, G.M., Choi, T.: Improving the interaction between overlay routing and traffic engineering. In: NETWORKING 2008 Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, vol. 4982, pp. 530\u2013541. LNCS, Springer, Berlin (2008)","DOI":"10.1007\/978-3-540-79549-0_46"},{"key":"1702_CR49","unstructured":"Liu, Y., Zhang, H., Gong, W., Towsley, D.: On the interaction between overlay routing and underlay routing. In: Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, IEEE, vol.\u00a04, pp. 2543\u20132553. (2005)"},{"key":"1702_CR50","doi-asserted-by":"crossref","unstructured":"Niemiec, M., Romanski, L., Swiety, M.: Quantum cryptography protocol simulator. In: Communications in Computer and Information Science, CCIS, vol. 149, pp. 286\u2013292. (2011)","DOI":"10.1007\/978-3-642-21512-4_34"},{"key":"1702_CR51","doi-asserted-by":"crossref","unstructured":"Pereszlenyi, A.: Simulation of quantum key distribution with noisy channels. In: Proceedings of the 8th International Conference on Telecommunications, ConTEL, IEEE , vol.\u00a01, pp. 203\u2013210. (2005)","DOI":"10.1109\/CONTEL.2005.185853"},{"key":"1702_CR52","doi-asserted-by":"crossref","unstructured":"Zhang, X., Wen, Q.: Object-oriented quantum cryptography simulation model. In: Third International Conference on Natural Computation, Number ICNC, IEEE, pp. 7\u201310. (2007)","DOI":"10.1109\/ICNC.2007.509"},{"issue":"7","key":"1702_CR53","doi-asserted-by":"crossref","first-page":"1251","DOI":"10.1166\/jctn.2008.2560","volume":"5","author":"S Zhao","year":"2008","unstructured":"Zhao, S., De Raedt, H., Liu, B., Huang, Y.: Event-by-event simulation of quantum cryptography protocols. J. Comput. Theor. Nanosci. 5(7), 1251\u20131254 (2008)","journal-title":"J. Comput. Theor. Nanosci."},{"key":"1702_CR54","doi-asserted-by":"crossref","unstructured":"Buhari, A.: An efficient modeling and simulation of quantum key distribution protocols using OptiSystem. In: IEEE Symposium on Industrial Electronics and Applications (ISIEA), pp. 84\u201389. Bandung (2012)","DOI":"10.1109\/ISIEA.2012.6496677"},{"key":"1702_CR55","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/ACCESS.2015.2399101","volume":"3","author":"LO Mailloux","year":"2015","unstructured":"Mailloux, L.O., Morris, J.D., Grimaila, M.R., Hodson, D.D., Jacques, D.R., Colombi, J.M., Mclaughlin, C.V., Holes, J.A.: A modeling framework for studying quantum key distribution system implementation nonidealities. IEEE Access 3, 110\u2013130 (2015)","journal-title":"IEEE Access"},{"issue":"5","key":"1702_CR56","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/2.841785","volume":"33","author":"L Breslau","year":"2000","unstructured":"Breslau, L., Estrin, D., Fall, K., Floyd, S., Heidemann, J., Helmy, A., Huang, P., McCanne, S., Varadhan, K., Xu, Y., Yu, H.: Advances in network simulation. Computer 33(5), 59\u201367 (2000)","journal-title":"Computer"},{"key":"1702_CR57","doi-asserted-by":"crossref","unstructured":"Cavin, D., Sasson, Y., Schiper, A.: On the accuracy of MANET simulators. In: Proceedings of the second ACM International Workshop on Principles of Mobile Computing\u2014POMC \u201902, vol.\u00a01, p. 38. ACM Press, New York (2002)","DOI":"10.1145\/584490.584499"},{"issue":"7","key":"1702_CR58","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MC.2006.242","volume":"39","author":"T Andel","year":"2006","unstructured":"Andel, T., Yasinac, A.: On the credibility of manet simulations. Computer 39(7), 48\u201354 (2006)","journal-title":"Computer"},{"key":"1702_CR59","doi-asserted-by":"publisher","unstructured":"Altman, E., Jimenez, T.: NS Simulator for Beginners. In: Walrand, J. (ed.) Synthesis Lectures on Communication Networks, vol.\u00a05. Morgan and Claypool Publishers (2012). doi: 10.2200\/S00397ED1V01Y201112CNT010","DOI":"10.2200\/S00397ED1V01Y201112CNT010"},{"key":"1702_CR60","unstructured":"Aguado, A., Martin, V., Lopez, D., Peev, M., Martinez-Mateo, J., Rosales, J., de la Iglesia, F., Gomez, M., Hugues-Salas, E., Lord, A., Nejabati, R.: Quantum-aware software defined networks. In: 6th International Conference on Quantum Cryptography (QCRYPT 2016), p. 3. QCrypt, Washington, DC (2016)"},{"key":"1702_CR61","unstructured":"Rass, S., Sandra, K.: Indirect Eavesdropping in Quantum Networks. In: The Fifth International Conference on Quantum, Nano and Micro Technologies, ICQNM, pp. 83\u201388. (2011)"},{"key":"1702_CR62","doi-asserted-by":"crossref","unstructured":"Mehic, M., Komosny, D., Mauhart, O., Voznak, M., Rozhon, J.: Impact of packet size variation in overlay quantum key distribution network. In: 2016 XI International Symposium on Telecommunications (BIHTEL), Sarajevo, Bosnia and Herzegovina, IEEE, pp. 1\u20136. (2016)","DOI":"10.1109\/BIHTEL.2016.7775711"},{"key":"1702_CR63","unstructured":"Cederl\u00f6f, J.: Authentication in quantum key growing. Ph.D. thesis, Master Thesis, Link\u00f6ping University (2005)"},{"key":"1702_CR64","doi-asserted-by":"publisher","unstructured":"Wehrle, K., G\u00fcnes, M., Gross, J. (eds.): Modeling and Tools for Network Simulation, 1st edn. Springer-Verlag Berlin Heidelberg (2010). doi: 10.1007\/978-3-642-12331-3","DOI":"10.1007\/978-3-642-12331-3"},{"key":"1702_CR65","doi-asserted-by":"crossref","unstructured":"Riley, G.F., Henderson, T.R.: The ns-3 network simulator. In: Modeling and Tools for Network Simulation, pp. 15\u201334. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-12331-3_2"},{"key":"1702_CR66","unstructured":"Fall, K., Varadhan, K.: The Network Simulator (ns-2). http:\/\/www.isi.edu\/nsnam\/ns (2007)"},{"issue":"7","key":"1702_CR67","doi-asserted-by":"crossref","first-page":"075001","DOI":"10.1088\/1367-2630\/11\/7\/075001","volume":"11","author":"M Peev","year":"2009","unstructured":"Peev, M., Pacher, C., All\u00e9aume, R., Barreiro, C., Bouda, J., Boxleitner, W., Debuisschert, T., Diamanti, E., Dianati, M., Dynes, J.F., Fasel, S., Fossier, S., F\u00fcrst, M., Gautier, J.D., Gay, O., Gisin, N., Grangier, P., Happe, A., Hasani, Y., Hentschel, M., H\u00fcbel, H., Humer, G., L\u00e4nger, T., Legr\u00e9, M., Lieger, R., Lodewyck, J., Lor\u00fcnser, T., L\u00fctkenhaus, N., Marhold, A., Matyus, T., Maurhart, O., Monat, L., Nauerth, S., Page, J.B., Poppe, A., Querasser, E., Ribordy, G., Robyr, S., Salvail, L., Sharpe, A.W., Shields, A.J., Stucki, D., Suda, M., Tamas, C., Themel, T., Thew, R.T., Thoma, Y., Treiber, A., Trinkler, P., Tualle-Brouri, R., Vannel, F., Walenta, N., Weier, H., Weinfurter, H., Wimberger, I., Yuan, Z.L., Zbinden, H., Zeilinger, A.: The SECOQC quantum key distribution network in Vienna. N. J. Phys. 11(7), 075001 (2009)","journal-title":"N. J. Phys."},{"key":"1702_CR68","unstructured":"Dodson, D., Fujiwara, M., Grangier, P., Hayashi, M., Imafuku, K., Kitayama, K.I., Kumar, P., Kurtsiefer, C., Lenhart, G., Luetkenhaus, N., et al.: Updating quantum cryptography report ver. 1. arXiv preprint arXiv:0905.4325 (2009)"},{"issue":"4","key":"1702_CR69","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1109\/TIT.2008.917697","volume":"54","author":"J Cederl\u00f6f","year":"2008","unstructured":"Cederl\u00f6f, J.: Larsson, Ja: Security aspects of the authentication used in quantum cryptography. IEEE Trans. Inf. Theory 54(4), 1735\u20131741 (2008). doi: 10.1109\/TIT.2008.917697","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1702_CR70","unstructured":"Dai, W.: Crypto++ library. Retrieved from http:\/\/www.cryptopp.com (2017)"},{"key":"1702_CR71","unstructured":"Maurhart, O., Pacher, C., Happe, A., Lor, T., Tamas, C., Poppe, A., Peev, M.: New release of an open source QKD software: design and implementation of new algorithms, modularization and integration with IPSec. In: Qcrypt 2013. (2013)"},{"key":"1702_CR72","doi-asserted-by":"crossref","unstructured":"Mehic, M., Partila, P., Tovarek, J., Voznak, M.: Calculation of key reduction for B92 QKD protocol. In Donkor, E., Pirich, A.R., Hayduk, M., (eds.) SPIE Sensing Technology + Applications, International Society for Optics and Photonics, p. 95001J. (2015)","DOI":"10.1117\/12.2177149"},{"key":"1702_CR73","doi-asserted-by":"crossref","unstructured":"Fedrizzi, A., Poppe, A., Ursin, R., Lor\u00fcnser, T., Peev, M., L\u00e4nger, T., Zeilinger, A.: Practical quantum key distribution with polarization entangled photons. In: 2005 European Quantum Electronics Conference, EQEC \u201905, vol. 16, p. 303. (2005)","DOI":"10.1109\/EQEC.2005.1567469"},{"key":"1702_CR74","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-04117-4","volume-title":"Handbook of Information and Communication Security","author":"P Stavroulakis","year":"2010","unstructured":"Stavroulakis, P., Stamp, M.: Handbook of Information and Communication Security. Springer, Heidelberg (2010)"},{"key":"1702_CR75","first-page":"62440M-1","volume":"6244","author":"A Mink","year":"2006","unstructured":"Mink, A., Tang, X., Ma, L., Nakassis, T., Hershman, B., Bienfang, J.C., Su, D., Boisvert, R., Clark, C.W., Williams, C.J.: High speed quantum key distribution system supports one-time pad encryption of real-time video. Proc. SPIE 6244, 62440M-1\u20137 (2006)","journal-title":"Proc. SPIE"},{"issue":"4","key":"1702_CR76","doi-asserted-by":"crossref","first-page":"1031","DOI":"10.1109\/JSTQE.2007.902841","volume":"13","author":"A Tajima","year":"2007","unstructured":"Tajima, A., Tanaka, A., Maeda, W., Takahashi, S., Tomita, A.: Practical quantum cryptosystem for metro area applications. IEEE J. Sel. Top. Quantum Electron. 13(4), 1031\u20131037 (2007)","journal-title":"IEEE J. Sel. Top. Quantum Electron."},{"issue":"6","key":"1702_CR77","doi-asserted-by":"crossref","first-page":"A185","DOI":"10.1364\/JOSAB.27.00A185","volume":"27","author":"A Mirza","year":"2010","unstructured":"Mirza, A., Petruccione, F.: Realizing long-term quantum cryptography. J. Opt. Soc. Am. B 27(6), A185 (2010)","journal-title":"J. Opt. Soc. Am. B"},{"key":"1702_CR78","unstructured":"Langer, T.: The practical application of quantum key distribution. Ph.D. thesis, University of Lausanne (2013)"},{"key":"1702_CR79","doi-asserted-by":"crossref","unstructured":"Chakeres, I.D., Belding-Royer, E.M.: AODV Routing Protocol Implementation Design. In: Proceedings of 24th International Conference on Distributed Computing Systems Workshops, Hachioji, Tokyo, Japan, 23\u201324 March 2004, pp.\u00a0698\u2013703. IEEE (2004)","DOI":"10.1109\/ICDCSW.2004.1284108"},{"issue":"11","key":"1702_CR80","first-page":"1728","volume":"7","author":"P Fazio","year":"2012","unstructured":"Fazio, P., De Rango, F., Sottile, C.: An on demand interference aware routing protocol for VANETS. J. Netw. 7(11), 1728\u20131738 (2012)","journal-title":"J. Netw."},{"key":"1702_CR81","unstructured":"He, G.: Destination-Sequenced Distance Vector (DSDV) Protocol, pp. 1\u20139. Networking Laboratory, Helsinki University of Technology (2002). http:\/\/www.netlab.tkk.fi\/opetus\/s38030\/k02\/Papers\/03-Guoyou.pdf"},{"key":"1702_CR82","doi-asserted-by":"crossref","unstructured":"Mehic, M., Fazio, P., Voznak, M., Partila, P., Komosny, D., Tovarek, J., Chmelikova, Z.: On using multiple routing metrics with destination sequenced distance vector protocol for MultiHop wireless ad hoc networks. Int. Soc. Opt. Photon. 98480F (2016)","DOI":"10.1117\/12.2223671"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-017-1702-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-017-1702-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-017-1702-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T08:50:51Z","timestamp":1750841451000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-017-1702-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,30]]},"references-count":82,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["1702"],"URL":"https:\/\/doi.org\/10.1007\/s11128-017-1702-z","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,30]]},"article-number":"253"}}