Cascading attack on trusted-relay quantum key distribution networks
Jian Wang,Xing-tong Liu
Figure 3.
Influence of
γ
on $E(P({e}_{{ij}}))$ in the simulation of a cascading attack on a QKD network.