How to overcome the 'Trusted Node Model' in Quantum Cryptography | IEEE Conference Publication | IEEE Xplore