Quantum Key Distribution in-field implementations

.............................................................................................................. 1 Acknowledgements ................................................................................................ 2 Executive summary ............................................................................................... 3