Ensuring End-to-End Security in Computing Continuum Exploiting Physical Unclonable Functions | IEEE Conference Publication | IEEE Xplore