Abstract: This paper presents an evaluation of authentication mechanisms for mobile agents on top of a Java environment. In these mechanisms, the authentication of mobile agents is controlled by the ...