{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T10:21:18Z","timestamp":1776334878243,"version":"3.51.2"},"reference-count":251,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3109816","type":"journal-article","created":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T20:13:10Z","timestamp":1630527190000},"page":"125868-125911","source":"Crossref","is-referenced-by-count":70,"title":["Survey of Promising Technologies for Quantum Drones and Networks"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2919-6302","authenticated-orcid":false,"given":"Adarsh","family":"Kumar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3097-6568","authenticated-orcid":false,"given":"Surbhi","family":"Bhatia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3777-765X","authenticated-orcid":false,"given":"Keshav","family":"Kaushik","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5957-5859","authenticated-orcid":false,"given":"S. Manjula","family":"Gandhi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8357-9243","authenticated-orcid":false,"given":"S. Gayathri","family":"Devi","sequence":"additional","affiliation":[]},{"given":"Diego A.","family":"De J. Pacheco","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0612-6005","authenticated-orcid":false,"given":"Arwa","family":"Mashat","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","year":"2021","journal-title":"NSA Surveillance Edward Snowden and the End of Privacy A Real-Time Account of the Biggest Leaks in US History"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1201\/9781351021708-15"},{"key":"ref171","year":"2021","journal-title":"Analyzing Quantum Insert Attacks&#x2014;Infosec Resources"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/abfa63"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1038\/s41566-017-0032-0"},{"key":"ref176","year":"2021","journal-title":"Quantum Safe Cryptography and Security"},{"key":"ref175","article-title":"Design of a quantum-repeater using quantum-circuits and benchmarking its performance on an IBM quantum-computer","author":"das","year":"2020","journal-title":"arXiv 2009 04584"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1145\/3241037"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.413918"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1002\/que2.36"},{"key":"ref169","first-page":"317","article-title":"Shor&#x2019;s discrete logarithm quantum algorithm for elliptic curves","volume":"3","author":"proos","year":"2003","journal-title":"Quantum Inf Comput"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3466132.3466779"},{"key":"ref38","article-title":"China&#x2019;s quantum satellite experiments: Strategic and military implications","author":"raska","year":"2016"},{"key":"ref33","first-page":"1","article-title":"Constrained quantum optimization algorithm","author":"el gaily","year":"2021","journal-title":"Proc 20th Int Symp Infoteh-Jahorina"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JSTQE.2007.902724"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.89.035002"},{"key":"ref30","article-title":"Overview of the status of quantum science and technology and recommendations for the DoD","author":"wolf","year":"2019"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2966683"},{"key":"ref36","author":"choi","year":"2019","journal-title":"World&#x2019;s First Quantum Drone for Impenetrable Air-to-Ground Data Links Takes Off"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.scib.2017.06.007"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1038\/nature23474"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73190-0_2"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1119\/1.1463744"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/GrC.2007.87"},{"key":"ref184","first-page":"1354","article-title":"Genetic quantum algorithm and its application to combinatorial optimization problem","volume":"2","author":"han","year":"2000","journal-title":"Proc Congr Evol Comput"},{"key":"ref183","first-page":"1422","article-title":"Parallel quantum-inspired genetic algorithm for combinatorial optimization problem","author":"han","year":"2001","journal-title":"Proc Congr Evol Comput"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2002.804320"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/WiSEE.2017.8124890"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2017.8335579"},{"key":"ref187","first-page":"73","article-title":"Coalition formation among autonomous agents","author":"ketchpel","year":"1993","journal-title":"Proc Eur Workshop Modelling Autonomous Agents Multi-Agent World"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.11.008"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11082-021-02829-8"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"547","DOI":"10.11728\/cjss2014.05.547","article-title":"Space science activities in China quantum science satellite","volume":"34","author":"jianwei","year":"2014","journal-title":"Chin J Space Sci"},{"key":"ref179","author":"crawford","year":"2021","journal-title":"Quantum Authentication Current and Future Research Directions"},{"key":"ref29","article-title":"Quantum warfare: Definitions, overview and challenges","author":"krelina","year":"2021","journal-title":"arXiv 2103 12548"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2019.2908836"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207714"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2970105"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2958788"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TQE.2020.3030314"},{"key":"ref26","article-title":"A survey and tutorial on security and resilience of quantum computing","author":"saki","year":"2021","journal-title":"arXiv 2106 06081"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968985"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/ab4bea"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-8354-4_25"},{"key":"ref154","author":"dilmegani","year":"2021","journal-title":"Quantum Artificial Intelligence in 2021 In-Depth Guide"},{"key":"ref153","year":"2021","journal-title":"How Quantum Computers Will Revolutionise Artificial Intelligence Machine Learning and Bid Data"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-017-9438-0"},{"key":"ref155","year":"2021","journal-title":"AI Applications of Quantum Computing"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2000429"},{"key":"ref152","article-title":"Fusion of blockchain and artificial intelligence for secure drone networking underlying 5G communications","volume":"32","author":"gupta","year":"2021","journal-title":"Trans Emerg Telecommun Technol"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.126.020503"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2680898"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1088\/1361-6633\/aab406"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1007\/s13748-014-0059-0"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2746752"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1038\/nature08812"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2009.36"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.90.042335"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.99.062311"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1364\/AOP.361502"},{"key":"ref54","year":"2021","journal-title":"Quantum Algorithm Zoo"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/aa6aca"},{"key":"ref52","year":"2018","journal-title":"Quantum algorithm implementations for beginners"},{"key":"ref40","article-title":"Physical layer security for UAV communications in 5G and beyond networks","author":"wang","year":"2021","journal-title":"arXiv 2105 11332"},{"key":"ref167","first-page":"552","article-title":"Quantum attacks without superposition queries: The offline Simon&#x2019;s algorithm","volume":"11921","author":"bonnetain","year":"2019","journal-title":"Advances in Cryptology"},{"key":"ref166","author":"roetteler","year":"2021","journal-title":"Quantum resource estimates for computing elliptic curve discrete logarithms"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2013-0038"},{"key":"ref164","article-title":"Multi-photon and side-channel attacks in mistrustful quantum cryptography","author":"bozzio","year":"2021","journal-title":"arXiv 2103 06970"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-020-02673-x"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSIT.2018.8748675"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8105"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7722-9_2"},{"key":"ref4","author":"hambling","year":"2016","journal-title":"Quantum Film Sensor Stops Delivery Drones Crashing Into Things"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/drones3010027"},{"key":"ref6","article-title":"Quantum cooperative robotics and autonomy","author":"khoshnoud","year":"2020","journal-title":"arXiv 2008 12230"},{"key":"ref5","first-page":"61801","article-title":"Drone-based quantum key distribution","volume":"51","author":"hill","year":"2017","journal-title":"Urbana"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1093\/nsr\/nwz227"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7722-9"},{"key":"ref7","author":"cartlidge","year":"2021","journal-title":"Quantum Sensors A Revolution in the Offing|Optics & Photonics News"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3052256"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1038\/nature23474"},{"key":"ref9","author":"irving","year":"2021","journal-title":"Quantum Communication Network Goes Long With Help of Drones"},{"key":"ref158","article-title":"Deep learning and quantum entanglement: Fundamental connections with implications to network design","author":"levine","year":"2017","journal-title":"arXiv 1704 01552"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2018.8389185"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2019.12.012"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2017.2780981"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2020.2982755"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2927379"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2943900"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2968296"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.0011.1900093"},{"key":"ref73","first-page":"213","article-title":"Quantum cryptography for Internet of Things security","volume":"17","author":"bhatt","year":"2019","journal-title":"J Electron Sci Technol"},{"key":"ref72","year":"2016","journal-title":"Internet Security Threat Report"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"ref70","year":"2017","journal-title":"Quantum-Safe Cryptography Quantum-Safe Threat Assessment"},{"key":"ref76","article-title":"Quantum marine predators algorithm for addressing multilevel image segmentation","volume":"4","author":"abd elaziz","year":"2021","journal-title":"Appl Soft Comput"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2020.07.039"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2774439"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2020.126745"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114555"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.jobe.2020.102048"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1002\/1521-3978(200009)48:9\/11<771::AID-PROP771>3.0.CO;2-E"},{"key":"ref62","first-page":"171","article-title":"How to build a 300 bit, 1 giga-operation quantum computer","volume":"7","author":"steane","year":"2007","journal-title":"Quantum Inf Comput"},{"key":"ref61","first-page":"297","article-title":"Quantum computer architecture for fast entropy extraction","volume":"2","author":"steane","year":"2002","journal-title":"Quantum Inf Comput"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1080\/00107510500293261"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1126257.1126259"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevX.2.031007"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1093\/nsr\/nwz227"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900092"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1038\/nature07127"},{"key":"ref69","year":"2015","journal-title":"Quantum Safe Cryptography and Security An introduction benefits enablers and challenges"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.09.181"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmaa.2008.12.065"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.04.301"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-007-9149-x"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2010.2046035"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.04.070"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2010.01.009"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1186\/s43020-020-00023-x"},{"key":"ref94","year":"2021","journal-title":"China Launches World&#x2019;s First Quantum Communications Satellite Into Space"},{"key":"ref190","first-page":"19","article-title":"Multi-agent coalition formation in power transmission planning: A bilateral Shapley value approach","author":"contreras","year":"1998","journal-title":"Proc AIPS"},{"key":"ref93","first-page":"1","article-title":"Overview of NASA&#x2019;s national space quantum laboratory program","author":"hamiltona","year":"2019","journal-title":"Proc IAC"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105802"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1088\/0256-307X\/34\/9\/090302"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2013.04.004"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.98.010504"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1038\/nature23655"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1038\/nature11332"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-019-02474-y"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1364\/OE.19.010387"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-018-0766-y"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TQE.2021.3063635"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3084467"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TQE.2020.3012068"},{"key":"ref83","first-page":"214","article-title":"Quantum minimum searching algorithm and circuit implementation","author":"kang","year":"2020","journal-title":"Proc Int Conf Inf Commun Technol Converg (ICTC)"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.istruc.2021.03.046"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63115-4_19"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3055537"},{"key":"ref86","first-page":"89","article-title":"An efficient quantum computing technique for cracking RSA using Shor&#x2019;s algorithm","author":"bhatia","year":"2020","journal-title":"Proc IEEE 5th Int Conf Comput Commun Autom (ICCCA)"},{"key":"ref87","article-title":"MoG-VQE: Multiobjective genetic variational quantum eigensolver","author":"chivilikhin","year":"2020","journal-title":"arXiv 2007 04424"},{"key":"ref88","first-page":"395","article-title":"An HHL-based algorithm for computing hitting probabilities of quantum random walks","volume":"121","author":"guan","year":"2020","journal-title":"Quant Phys"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.11.009"},{"key":"ref101","year":"2021","journal-title":"Airbus Zephyr"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.paerosci.2017.04.003"},{"key":"ref209","first-page":"154","article-title":"Code-based ring signature scheme","volume":"5","author":"zheng","year":"2007","journal-title":"Int J Netw Secur"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2019.06.002"},{"key":"ref204","first-page":"114","article-title":"A public-key cryptosystem based on algebraic","volume":"4244","author":"mceliece","year":"1978","journal-title":"Coding Thv"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2016.06.003"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/ICEC.1996.542334"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0024461"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73074-3_18"},{"key":"ref205","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1109\/18.272496","article-title":"On the equivalence of McEliece&#x2019;s and Niederreiter&#x2019;s public-key cryptosystems","volume":"40","author":"li","year":"1994","journal-title":"IEEE Trans Inf Theory"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_10"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3062201"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2145950"},{"key":"ref212","article-title":"Code-based cryptography","author":"j\u00f6meri","year":"2020"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116252"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.22201\/fi.25940732e.2019.20n2.018"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00213"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.23919\/ICMU.2017.8330093"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMMST.2017.8246360"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102165"},{"key":"ref219","article-title":"Lattice-based PKE\/KEM","volume":"4","author":"lu","year":"2021","journal-title":"Natl Sci Rev"},{"key":"ref220","article-title":"High-speed NTT-based polynomial multiplication accelerator for CRYSTALS-kyber post-quantum cryptography","author":"bisheh-niasar","year":"2021"},{"key":"ref222","first-page":"242","article-title":"Multivariate public key cryptosystem from sidon spaces","volume":"1","author":"raviv","year":"2021","journal-title":"Public Key Cryptography Conf"},{"key":"ref221","author":"mazzola","year":"2021","journal-title":"Investigation on NIST Post-Quantum Lattice-Based Encryption Schemes"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.08.032"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-73492-3_15"},{"key":"ref227","first-page":"1","article-title":"Radical isogenies on Montgomery curves","author":"onuki","year":"2021","journal-title":"Proc ICAR"},{"key":"ref226","article-title":"GeMSS: A great multivariate short signature","author":"casanova","year":"2017"},{"key":"ref225","article-title":"Post-quantum digital signature scheme based on multivariate cubic problem","volume":"53","author":"kundu","year":"2020","journal-title":"J Inf Secur Appl"},{"key":"ref224","first-page":"1","article-title":"On the effect of projection on rank attacks in multivariate cryptography","author":"\u00f8ygarden","year":"2021","journal-title":"Proc IACR"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3059434"},{"key":"ref127","article-title":"Drone-based quantum key distribution","volume":"11678","author":"conrad","year":"2021","journal-title":"Proc SPIE"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909530"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-019-1666-5"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/BF02650179"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1080\/00107514.2014.964942"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/aab859"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1080\/0194262X.2020.1776193"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/aabd98"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-017-13378-0"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.117.130501"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-017-0017-3"},{"key":"ref232","first-page":"13569","article-title":"Let&#x2019;s learn their language? A case for planning with automata-network languages from model checking","volume":"34","author":"hoffmann","year":"2020","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/4878962"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3090270"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3151328"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101955"},{"key":"ref238","article-title":"Efficient post-quantum and compact cryptographic constructions for the Internet of Things","author":"behnia","year":"2021"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_6"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2016.01.045"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71045-7_11"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42045-0_4"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-017-01711-6"},{"key":"ref135","first-page":"1","article-title":"Quantum recommendation systems","author":"kerenidis","year":"2017","journal-title":"Proc 8th Innov Theor Comput Sci Conf (ITCS)"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2015.2509024"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.3390\/e23040460"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.3390\/rs9020100"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1007\/s42354-019-0212-9"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.3390\/s19071651"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3296874"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2922544"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13577-4_8"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-018-9559-8"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3761719"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.100.062334"},{"key":"ref241","author":"nitaj","year":"2021","journal-title":"Quantum and Post Quantum Cryptography"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1103\/Physics.14.25"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1140\/epjqt\/s40507-019-0072-0"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1126\/science.abe8122"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-79063-3_21"},{"key":"ref248","first-page":"1","article-title":"Software tools for quantum control: Improving quantum computer performance through noise and error suppression","author":"ball","year":"2021","journal-title":"Quantum Sci Technol"},{"key":"ref247","author":"kop","year":"2021","journal-title":"Establishing a Legal-Ethical Framework for Quantum Technology"},{"key":"ref246","article-title":"Efficient hardware constructions for error detection of post-quantum cryptographic schemes","author":"cintas-canto","year":"2021"},{"key":"ref245","author":"pakin","year":"2019","journal-title":"The Problem with Quantum Computers"},{"key":"ref249","article-title":"Intelligent trajectory planning in UAV-mounted wireless networks: A quantum-inspired reinforcement learning perspective","author":"li","year":"2021","journal-title":"IEEE Wireless Commun Lett"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2015.2503286"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/5GWF.2019.8911640"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8255103"},{"key":"ref106","year":"2017","journal-title":"Quantum Technologies in Space Intermediate Strategic Report for ESA and National Space Agencies"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3028247"},{"key":"ref104","year":"2019","journal-title":"ESA Moon Village Project Webpage"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2537208"},{"key":"ref102","year":"2021","journal-title":"Drones Could Help Create a Quantum Internet"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2011.09.036"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-020-00327-5"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1016\/j.actaastro.2005.03.023"},{"key":"ref250","article-title":"Joint resource block and beamforming optimization for cellular-connected UAV networks: A hybrid D3QN-DDPG approach","author":"li","year":"2021","journal-title":"arXiv 2102 13222"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaf9852"},{"key":"ref10","author":"bobier","year":"2020","journal-title":"A Quantum Advantage in Fighting Climate Change"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3431234"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-015-1195-6"},{"key":"ref13","year":"2016","journal-title":"QGIS Development Team"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2016.7845501"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1103\/Physics.14.7"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3422178","article-title":"Lattice-based key-sharing schemes","volume":"54","author":"ravi","year":"2021","journal-title":"ACM Comput Surv"},{"key":"ref118","article-title":"Quantum internet-applications, functionalities, enabling technologies, challenges, and research directions","author":"singh","year":"2021","journal-title":"arXiv 2101 04427"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2016.79"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42664-4_1"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2018.11.002"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10559-019-00107-w"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916177"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/10\/3\/033038"},{"key":"ref113","year":"2021","journal-title":"Quantum Science Satellite"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.120.210501"},{"key":"ref115","article-title":"Quantum key distribution data post-processing with limited resources: Towards satellite-based quantum communication","author":"gigov","year":"2013"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3056341"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecolind.2018.08.042"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422377"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1007\/s42484-019-00006-5"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09527199.pdf?arnumber=9527199","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T05:02:59Z","timestamp":1699419779000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9527199\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":251,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3109816","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}