summaryrefslogtreecommitdiffstats
path: root/ausarbeitung/maindoc.toc
diff options
context:
space:
mode:
Diffstat (limited to 'ausarbeitung/maindoc.toc')
-rw-r--r--ausarbeitung/maindoc.toc69
1 files changed, 34 insertions, 35 deletions
diff --git a/ausarbeitung/maindoc.toc b/ausarbeitung/maindoc.toc
index 5615a64..a218c0a 100644
--- a/ausarbeitung/maindoc.toc
+++ b/ausarbeitung/maindoc.toc
@@ -1,37 +1,36 @@
\select@language {ngerman}
\contentsline {section}{\numberline {1}Einleitung}{2}{section.1}
-\contentsline {section}{\numberline {2}Tutorial}{3}{section.2}
-\contentsline {subsection}{\numberline {2.1}CeGCC}{3}{subsection.2.1}
-\contentsline {subsection}{\numberline {2.2}Enlightenment}{3}{subsection.2.2}
-\contentsline {subsubsection}{\numberline {2.2.1}evil}{5}{subsubsection.2.2.1}
-\contentsline {subsubsection}{\numberline {2.2.2}eina}{6}{subsubsection.2.2.2}
-\contentsline {subsubsection}{\numberline {2.2.3}eet}{6}{subsubsection.2.2.3}
-\contentsline {subsubsection}{\numberline {2.2.4}embryo}{7}{subsubsection.2.2.4}
-\contentsline {subsubsection}{\numberline {2.2.5}evas}{7}{subsubsection.2.2.5}
-\contentsline {subsubsection}{\numberline {2.2.6}ecore}{9}{subsubsection.2.2.6}
-\contentsline {subsubsection}{\numberline {2.2.7}edje}{9}{subsubsection.2.2.7}
-\contentsline {subsubsection}{\numberline {2.2.8}elementary}{10}{subsubsection.2.2.8}
-\contentsline {subsubsection}{\numberline {2.2.9}Weitere Schritte}{10}{subsubsection.2.2.9}
-\contentsline {section}{\numberline {3}Friend Finder}{11}{section.3}
-\contentsline {subsection}{\numberline {3.1}Features}{11}{subsection.3.1}
-\contentsline {subsubsection}{\numberline {3.1.1}Nachrichten versenden}{11}{subsubsection.3.1.1}
-\contentsline {subsubsection}{\numberline {3.1.2}Eigene Position senden}{11}{subsubsection.3.1.2}
-\contentsline {subsubsection}{\numberline {3.1.3}Position anderer Teilnehmer anzeigen}{11}{subsubsection.3.1.3}
-\contentsline {subsubsection}{\numberline {3.1.4}2D-Barcode}{12}{subsubsection.3.1.4}
-\contentsline {subsection}{\numberline {3.2}Verwendete Verfahren und Bibliotheken}{12}{subsection.3.2}
-\contentsline {subsubsection}{\numberline {3.2.1}Versenden der Nachrichten}{12}{subsubsection.3.2.1}
-\contentsline {subsubsection}{\numberline {3.2.2}Verschl\IeC {\"u}sselung der Daten}{12}{subsubsection.3.2.2}
-\contentsline {subsubsection}{\numberline {3.2.3}Erzeugen eines 2D-Barcodes}{13}{subsubsection.3.2.3}
-\contentsline {subsubsection}{\numberline {3.2.4}Grafisches Benutzeroberfl\IeC {\"a}che}{13}{subsubsection.3.2.4}
-\contentsline {subsection}{\numberline {3.3}Implementierung}{13}{subsection.3.3}
-\contentsline {subsection}{\numberline {3.4}Analyse}{15}{subsection.3.4}
-\contentsline {section}{\numberline {4}Ausblick}{17}{section.4}
-\contentsline {subsection}{\numberline {4.1}Plattformunabh\IeC {\"a}ngigkeit}{17}{subsection.4.1}
-\contentsline {subsubsection}{\numberline {4.1.1}Windows Mobile}{17}{subsubsection.4.1.1}
-\contentsline {subsubsection}{\numberline {4.1.2}Android}{17}{subsubsection.4.1.2}
-\contentsline {subsubsection}{\numberline {4.1.3}WebOS}{18}{subsubsection.4.1.3}
-\contentsline {subsection}{\numberline {4.2}Kryptographische Verfahren auf Mobilen Plattformen}{18}{subsection.4.2}
-\contentsline {subsubsection}{\numberline {4.2.1}Symmetrische Verschl\IeC {\"u}sselungsverfahren}{19}{subsubsection.4.2.1}
-\contentsline {subsubsection}{\numberline {4.2.2}Asymmetrische Verschl\IeC {\"u}sselungsverfahren}{20}{subsubsection.4.2.2}
-\contentsline {subsection}{\numberline {4.3}Alternative \textit {location awareness} Verfahren}{20}{subsection.4.3}
-\contentsline {subsection}{\numberline {4.4}Zusammenfassung}{21}{subsection.4.4}
+\contentsline {section}{\numberline {2}Technische Grundlagen}{3}{section.2}
+\contentsline {subsection}{\numberline {2.1}Betriebsysteme f\IeC {\"u}r mobile Ger\IeC {\"a}te}{3}{subsection.2.1}
+\contentsline {subsubsection}{\numberline {2.1.1}Windows Mobile}{3}{subsubsection.2.1.1}
+\contentsline {subsubsection}{\numberline {2.1.2}Android}{4}{subsubsection.2.1.2}
+\contentsline {subsubsection}{\numberline {2.1.3}WebOS}{4}{subsubsection.2.1.3}
+\contentsline {subsubsection}{\numberline {2.1.4}iPhone OS}{4}{subsubsection.2.1.4}
+\contentsline {subsubsection}{\numberline {2.1.5}Symbian OS}{5}{subsubsection.2.1.5}
+\contentsline {subsubsection}{\numberline {2.1.6}Zielplattform}{5}{subsubsection.2.1.6}
+\contentsline {subsection}{\numberline {2.2}Softwaregrundlagen}{5}{subsection.2.2}
+\contentsline {subsubsection}{\numberline {2.2.1}CeGCC}{6}{subsubsection.2.2.1}
+\contentsline {subsubsection}{\numberline {2.2.2}Enlightenment}{6}{subsubsection.2.2.2}
+\contentsline {section}{\numberline {3}Friend Finder}{8}{section.3}
+\contentsline {subsection}{\numberline {3.1}Anforderungsanalyse}{8}{subsection.3.1}
+\contentsline {subsubsection}{\numberline {3.1.1}Eigene Position senden}{9}{subsubsection.3.1.1}
+\contentsline {subsubsection}{\numberline {3.1.2}Position anderer Teilnehmer anzeigen}{9}{subsubsection.3.1.2}
+\contentsline {subsubsection}{\numberline {3.1.3}Nachrichten versenden und empfangen}{9}{subsubsection.3.1.3}
+\contentsline {subsubsection}{\numberline {3.1.4}2D-Barcode}{9}{subsubsection.3.1.4}
+\contentsline {subsection}{\numberline {3.2}Verwendete Verfahren und Bibliotheken}{10}{subsection.3.2}
+\contentsline {subsubsection}{\numberline {3.2.1}Grafisches Benutzeroberfl\IeC {\"a}che}{10}{subsubsection.3.2.1}
+\contentsline {subsubsection}{\numberline {3.2.2}Versenden der Nachrichten}{11}{subsubsection.3.2.2}
+\contentsline {subsubsection}{\numberline {3.2.3}Versenden der eigenen Position}{12}{subsubsection.3.2.3}
+\contentsline {subsubsection}{\numberline {3.2.4}Empfangen der eigenen Position}{12}{subsubsection.3.2.4}
+\contentsline {subsubsection}{\numberline {3.2.5}Erzeugen eines 2D-Barcodes}{13}{subsubsection.3.2.5}
+\contentsline {subsection}{\numberline {3.3}Analyse}{13}{subsection.3.3}
+\contentsline {subsubsection}{\numberline {3.3.1}Allgemeiner Datenverkehr}{13}{subsubsection.3.3.1}
+\contentsline {subsubsection}{\numberline {3.3.2}Versenden und Empfangen von Nachrichten}{14}{subsubsection.3.3.2}
+\contentsline {subsubsection}{\numberline {3.3.3}Versenden und Empfangen von Positionen}{14}{subsubsection.3.3.3}
+\contentsline {subsubsection}{\numberline {3.3.4}Fazit der Auswertung}{14}{subsubsection.3.3.4}
+\contentsline {section}{\numberline {4}Ausblick}{15}{section.4}
+\contentsline {subsection}{\numberline {4.1}Kryptographische Verfahren auf Mobilen Plattformen}{15}{subsection.4.1}
+\contentsline {subsubsection}{\numberline {4.1.1}Symmetrische Verschl\IeC {\"u}sselungsverfahren}{15}{subsubsection.4.1.1}
+\contentsline {subsubsection}{\numberline {4.1.2}Asymmetrische Verschl\IeC {\"u}sselungsverfahren}{16}{subsubsection.4.1.2}
+\contentsline {subsection}{\numberline {4.2}Alternative \textit {location awareness} Verfahren}{17}{subsection.4.2}
+\contentsline {subsection}{\numberline {4.3}Zusammenfassung}{17}{subsection.4.3}