summaryrefslogtreecommitdiffstats
path: root/ausarbeitung/maindoc.toc
blob: 75c98f4307b4f554953ba6ff91c0a9734367d9e3 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
\select@language {ngerman}
\contentsline {section}{\numberline {1}Einleitung}{2}{section.1}
\contentsline {section}{\numberline {2}Tutorial}{3}{section.2}
\contentsline {subsection}{\numberline {2.1}CeGCC}{3}{subsection.2.1}
\contentsline {subsection}{\numberline {2.2}Enlightenment}{3}{subsection.2.2}
\contentsline {subsubsection}{\numberline {2.2.1}evil}{5}{subsubsection.2.2.1}
\contentsline {subsubsection}{\numberline {2.2.2}eina}{6}{subsubsection.2.2.2}
\contentsline {subsubsection}{\numberline {2.2.3}eet}{6}{subsubsection.2.2.3}
\contentsline {subsubsection}{\numberline {2.2.4}embryo}{7}{subsubsection.2.2.4}
\contentsline {subsubsection}{\numberline {2.2.5}evas}{7}{subsubsection.2.2.5}
\contentsline {subsubsection}{\numberline {2.2.6}ecore}{9}{subsubsection.2.2.6}
\contentsline {subsubsection}{\numberline {2.2.7}edje}{9}{subsubsection.2.2.7}
\contentsline {subsubsection}{\numberline {2.2.8}elementary}{10}{subsubsection.2.2.8}
\contentsline {subsubsection}{\numberline {2.2.9}Weitere Schritte}{10}{subsubsection.2.2.9}
\contentsline {section}{\numberline {3}Friend Finder}{11}{section.3}
\contentsline {subsection}{\numberline {3.1}Features}{11}{subsection.3.1}
\contentsline {subsubsection}{\numberline {3.1.1}Nachrichten versenden}{11}{subsubsection.3.1.1}
\contentsline {subsubsection}{\numberline {3.1.2}Eigene Position senden}{11}{subsubsection.3.1.2}
\contentsline {subsubsection}{\numberline {3.1.3}Position anderer Teilnehmer anzeigen}{11}{subsubsection.3.1.3}
\contentsline {subsubsection}{\numberline {3.1.4}2D-Barcode}{12}{subsubsection.3.1.4}
\contentsline {subsection}{\numberline {3.2}Verwendete Verfahren und Bibliotheken}{12}{subsection.3.2}
\contentsline {subsubsection}{\numberline {3.2.1}Versenden der Nachrichten}{12}{subsubsection.3.2.1}
\contentsline {subsubsection}{\numberline {3.2.2}Verschl\IeC {\"u}sselung der Daten}{12}{subsubsection.3.2.2}
\contentsline {subsubsection}{\numberline {3.2.3}Erzeugen eines 2D-Barcodes}{13}{subsubsection.3.2.3}
\contentsline {subsubsection}{\numberline {3.2.4}Grafisches Benutzeroberfl\IeC {\"a}che}{13}{subsubsection.3.2.4}
\contentsline {subsection}{\numberline {3.3}Implementierung}{13}{subsection.3.3}
\contentsline {subsection}{\numberline {3.4}Analyse}{15}{subsection.3.4}
\contentsline {section}{\numberline {4}Ausblick}{17}{section.4}
\contentsline {subsection}{\numberline {4.1}Plattformunabh\IeC {\"a}ngigkeit}{17}{subsection.4.1}
\contentsline {subsubsection}{\numberline {4.1.1}Windows Mobile}{17}{subsubsection.4.1.1}
\contentsline {subsubsection}{\numberline {4.1.2}Android}{17}{subsubsection.4.1.2}
\contentsline {subsubsection}{\numberline {4.1.3}WebOS}{18}{subsubsection.4.1.3}
\contentsline {subsection}{\numberline {4.2}Kryptographische Verfahren auf Mobilen Plattformen}{18}{subsection.4.2}
\contentsline {subsubsection}{\numberline {4.2.1}Symmetrische Verschl\IeC {\"u}sselungsverfahren}{19}{subsubsection.4.2.1}
\contentsline {subsubsection}{\numberline {4.2.2}Asymmetrische Verschl\IeC {\"u}sselungsverfahren}{19}{subsubsection.4.2.2}
\contentsline {subsection}{\numberline {4.3}Alternative \textit {location awareness} Verfahren}{19}{subsection.4.3}
\contentsline {subsection}{\numberline {4.4}Zusammenfassung}{19}{subsection.4.4}