Mobile agent security through multi-agent cryptographic protocols.: Searching Inside