The multiple-access channel with an external eavesdropper: Trusted vs. untrusted users | IEEE Conference Publication | IEEE Xplore