Quantum key distribution: examination of the decoy state protocol | IEEE Journals & Magazine | IEEE Xplore