Security in Approximate Computing and Approximate Computing for Security: Challenges and Opportunities