A comparison analysis of trust-adaptive approaches to deliver signed public keys in P2P systems