Abstract—For wearable devices with constrained computa- tional resources, it is typically required to offload processing tasks to more capable servers. However, this practice introduces vulnerabilities to data confidentiality and integrity due to...

External Document