@INPROCEEDINGS{cgUCL-BCGPW15,
 	AUTHOR={Bernhard, David and Cortier, Veronique and Galindo, David and Pereira, Olivier and Warinschi, Bogdan},
	TITLE={{SoK: A comprehensive analysis of game-based ballot privacy definitions}},
	BOOKTITLE={IEEE Symposium on Security and Privacy 2015},
	PUBLISHER={IEEE Computer Society},
	MONTH={5},
	YEAR={2015},
}

@INPROCEEDINGS{cgUCL-BPW12,
 	AUTHOR={Bernhard, David and Pereira, Olivier and Warinschi, Bogdan},
	TITLE={{How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios}},
	BOOKTITLE={ASIACRYPT 2012},
	PUBLISHER={Springer},
	EDITOR={X. Wang and K. Sako},
	SERIES={Lecture Notes in Computer Science},
	VOLUME={7658},
	PAGES={626--643},
	MONTH={12},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-BCPW12,
 	AUTHOR={Bernhard, David and Cortier, Veronique and Pereira, Olivier and Warinschi, Bogdan},
	TITLE={{Measuring vote privacy, revisited}},
	BOOKTITLE={ACM Conference on Computer and Communications Security},
	PUBLISHER={ACM},
	EDITOR={Ting Yu and George Danezis and Virgil D. Gligor},
	PAGES={941-952},
	MONTH={10},
	YEAR={2012},
}

@INPROCEEDINGS{cgUCL-BCPSW11,
 	AUTHOR={Bernhard, David and Cortier, Veronique and Pereira, Olivier and Smyth, Ben and Warinschi, Bogdan},
	TITLE={{Adapting Helios for provable ballot privacy}},
	BOOKTITLE={Computer Security – ESORICS 2011},
	PUBLISHER={Springer},
	EDITOR={Vijay Atluri, Claudia Diaz},
	SERIES={Lecture Notes in Computer Science},
	MONTH={9},
	YEAR={2011},
}