Location Security -- Where to Enforce? | IEEE Conference Publication | IEEE Xplore