Secrecy capacity analysis in D2D underlay cellular networks: Colluding eavesdroppers | IEEE Conference Publication | IEEE Xplore