When Hardware Security Moves to the Edge and Fog | IEEE Conference Publication | IEEE Xplore