In the paper proposed secure architecture is FIPA compliant in the sense that every common FIPA compliant agent should be able to interact with agents having this extended architecture even not knowing the security mechanisms. On the other hand, agents demanding for security can, of course, refuse plain, non secured communication with non authenticated agents, etc. The security mechanisms can u...