This event is endorsed
and organized by

8th International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS)

December 1–3, 2014 | Boston, Massachusetts, United States

CFP: BICT 2014 Special Track on Security and Privacy in Bio-inspired Networks (SPBN)

8th International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS)

December 1 (Mon) - December 3, 2014 (Wed)
Boston, MA, USA

Recently, the expeditious development of wireless networks has led to the emergency of e-healthcare systems, providing expert-based medical treatment precisely and remotely. Kinds of bio-inspired networks are widely developed to support its rich functionalities. Wearable body sensors and portable wireless devices are deployed on, in or around the patient to automatically monitor realtime health conditions for medical treatment; The collected personal health information (PHI) will be forwarded to the healthcare provider via multiple hops’ transmission among distributed base stations or m-healthcare social groups; For the healthcare providers, after receiving the abnormal signals from the patients, appropriate and efficient treatment can be made to save medical resources. However, a series of challenging security and privacy issues have still not been well solved and significantly hampers the practicability and popularity of the underlying e-healthcare system.

The objective of the special track on Security and Privacy in Bio-inspired Networks is to provide a forum for researchers and industry practitioners to exchange and discuss novel ideas to give potential answers to the open challenges both in theory and practice to profoundly develop the techniques to meet multiple levels of security and privacy requirements. This special track seeks high-quality original and unpublished papers in the following topics including but not limited to these topics:

  • Security in Body Area Network
  • Security in Biometric Feature Extraction
  • Security in Medical Image Processing
  • PHI Confidentiality and Integrity
  • PHI Privacy and Unlinkability
  • Patient Identity and Location Privacy
  • PHI Access Control
  • Mutual Authentication
  • Secure Incentive Mechanism
  • Game Theory Application
  • Secure Packet Forwarding Protocol
  • Verifiable Outsourced Computation
  • Verifiable Outsourced Storage
  • Security and Privacy in Cloud Computing System


Regular paper submission due: September 1
Short and poster/demo paper submission due: September 22
Notification for regular papers: September 22
Notification for short and poster/demo papers: October 6
Camera ready due: October 13


Authors are invited to submit regular papers (up to 8 pages each), short papers (up to 4 pages each) or poster/demo papers (up to 2 pages each) in ACM format. Up to two extra pages are allowed for each paper with extra page charges. See for more details.


All accepted paper will be published by ACM and submitted for indexing by SI, EI Compendex, Scopus, ACM Library, Google Scholar and many more. Selected papers will be considered for publication in leading journals including:


Jun Zhou
Shanghai Jiao Tong University
Shanghai, China

Athanasios V. Vasilakos
Kuwait University


(To be announced)