\select@language {ngerman} \contentsline {section}{\numberline {1}Einleitung}{2}{section.1} \contentsline {section}{\numberline {2}Tutorial}{3}{section.2} \contentsline {subsection}{\numberline {2.1}CeGCC}{3}{subsection.2.1} \contentsline {subsection}{\numberline {2.2}Enlightenment}{3}{subsection.2.2} \contentsline {subsubsection}{\numberline {2.2.1}evil}{5}{subsubsection.2.2.1} \contentsline {subsubsection}{\numberline {2.2.2}eina}{6}{subsubsection.2.2.2} \contentsline {subsubsection}{\numberline {2.2.3}eet}{6}{subsubsection.2.2.3} \contentsline {subsubsection}{\numberline {2.2.4}embryo}{7}{subsubsection.2.2.4} \contentsline {subsubsection}{\numberline {2.2.5}evas}{7}{subsubsection.2.2.5} \contentsline {subsubsection}{\numberline {2.2.6}ecore}{9}{subsubsection.2.2.6} \contentsline {subsubsection}{\numberline {2.2.7}edje}{9}{subsubsection.2.2.7} \contentsline {subsubsection}{\numberline {2.2.8}elementary}{10}{subsubsection.2.2.8} \contentsline {subsubsection}{\numberline {2.2.9}Weitere Schritte}{10}{subsubsection.2.2.9} \contentsline {section}{\numberline {3}Friend Finder}{11}{section.3} \contentsline {subsection}{\numberline {3.1}Features}{11}{subsection.3.1} \contentsline {subsubsection}{\numberline {3.1.1}Nachrichten versenden}{11}{subsubsection.3.1.1} \contentsline {subsubsection}{\numberline {3.1.2}Eigene Position senden}{11}{subsubsection.3.1.2} \contentsline {subsubsection}{\numberline {3.1.3}Position anderer Teilnehmer anzeigen}{11}{subsubsection.3.1.3} \contentsline {subsubsection}{\numberline {3.1.4}2D-Barcode}{12}{subsubsection.3.1.4} \contentsline {subsection}{\numberline {3.2}Verwendete Verfahren und Bibliotheken}{12}{subsection.3.2} \contentsline {subsubsection}{\numberline {3.2.1}Versenden der Nachrichten}{12}{subsubsection.3.2.1} \contentsline {subsubsection}{\numberline {3.2.2}Verschl\IeC {\"u}sselung der Daten}{12}{subsubsection.3.2.2} \contentsline {subsubsection}{\numberline {3.2.3}Erzeugen eines 2D-Barcodes}{13}{subsubsection.3.2.3} \contentsline {subsubsection}{\numberline {3.2.4}Grafisches Benutzeroberfl\IeC {\"a}che}{13}{subsubsection.3.2.4} \contentsline {subsection}{\numberline {3.3}Implementierung}{13}{subsection.3.3} \contentsline {subsection}{\numberline {3.4}Analyse}{15}{subsection.3.4} \contentsline {section}{\numberline {4}Ausblick}{17}{section.4} \contentsline {subsection}{\numberline {4.1}Plattformunabh\IeC {\"a}ngigkeit}{17}{subsection.4.1} \contentsline {subsubsection}{\numberline {4.1.1}Windows Mobile}{17}{subsubsection.4.1.1} \contentsline {subsubsection}{\numberline {4.1.2}Android}{17}{subsubsection.4.1.2} \contentsline {subsubsection}{\numberline {4.1.3}WebOS}{18}{subsubsection.4.1.3} \contentsline {subsection}{\numberline {4.2}Kryptographische Verfahren auf Mobilen Plattformen}{18}{subsection.4.2} \contentsline {subsubsection}{\numberline {4.2.1}Symmetrische Verschl\IeC {\"u}sselungsverfahren}{19}{subsubsection.4.2.1} \contentsline {subsubsection}{\numberline {4.2.2}Asymmetrische Verschl\IeC {\"u}sselungsverfahren}{19}{subsubsection.4.2.2} \contentsline {subsection}{\numberline {4.3}Alternative \textit {location awareness} Verfahren}{19}{subsection.4.3} \contentsline {subsection}{\numberline {4.4}Zusammenfassung}{20}{subsection.4.4}