summaryrefslogtreecommitdiffstats
path: root/ausarbeitung/maindoc.toc
blob: a218c0af3efe25313b525959a630b912c1915171 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
\select@language {ngerman}
\contentsline {section}{\numberline {1}Einleitung}{2}{section.1}
\contentsline {section}{\numberline {2}Technische Grundlagen}{3}{section.2}
\contentsline {subsection}{\numberline {2.1}Betriebsysteme f\IeC {\"u}r mobile Ger\IeC {\"a}te}{3}{subsection.2.1}
\contentsline {subsubsection}{\numberline {2.1.1}Windows Mobile}{3}{subsubsection.2.1.1}
\contentsline {subsubsection}{\numberline {2.1.2}Android}{4}{subsubsection.2.1.2}
\contentsline {subsubsection}{\numberline {2.1.3}WebOS}{4}{subsubsection.2.1.3}
\contentsline {subsubsection}{\numberline {2.1.4}iPhone OS}{4}{subsubsection.2.1.4}
\contentsline {subsubsection}{\numberline {2.1.5}Symbian OS}{5}{subsubsection.2.1.5}
\contentsline {subsubsection}{\numberline {2.1.6}Zielplattform}{5}{subsubsection.2.1.6}
\contentsline {subsection}{\numberline {2.2}Softwaregrundlagen}{5}{subsection.2.2}
\contentsline {subsubsection}{\numberline {2.2.1}CeGCC}{6}{subsubsection.2.2.1}
\contentsline {subsubsection}{\numberline {2.2.2}Enlightenment}{6}{subsubsection.2.2.2}
\contentsline {section}{\numberline {3}Friend Finder}{8}{section.3}
\contentsline {subsection}{\numberline {3.1}Anforderungsanalyse}{8}{subsection.3.1}
\contentsline {subsubsection}{\numberline {3.1.1}Eigene Position senden}{9}{subsubsection.3.1.1}
\contentsline {subsubsection}{\numberline {3.1.2}Position anderer Teilnehmer anzeigen}{9}{subsubsection.3.1.2}
\contentsline {subsubsection}{\numberline {3.1.3}Nachrichten versenden und empfangen}{9}{subsubsection.3.1.3}
\contentsline {subsubsection}{\numberline {3.1.4}2D-Barcode}{9}{subsubsection.3.1.4}
\contentsline {subsection}{\numberline {3.2}Verwendete Verfahren und Bibliotheken}{10}{subsection.3.2}
\contentsline {subsubsection}{\numberline {3.2.1}Grafisches Benutzeroberfl\IeC {\"a}che}{10}{subsubsection.3.2.1}
\contentsline {subsubsection}{\numberline {3.2.2}Versenden der Nachrichten}{11}{subsubsection.3.2.2}
\contentsline {subsubsection}{\numberline {3.2.3}Versenden der eigenen Position}{12}{subsubsection.3.2.3}
\contentsline {subsubsection}{\numberline {3.2.4}Empfangen der eigenen Position}{12}{subsubsection.3.2.4}
\contentsline {subsubsection}{\numberline {3.2.5}Erzeugen eines 2D-Barcodes}{13}{subsubsection.3.2.5}
\contentsline {subsection}{\numberline {3.3}Analyse}{13}{subsection.3.3}
\contentsline {subsubsection}{\numberline {3.3.1}Allgemeiner Datenverkehr}{13}{subsubsection.3.3.1}
\contentsline {subsubsection}{\numberline {3.3.2}Versenden und Empfangen von Nachrichten}{14}{subsubsection.3.3.2}
\contentsline {subsubsection}{\numberline {3.3.3}Versenden und Empfangen von Positionen}{14}{subsubsection.3.3.3}
\contentsline {subsubsection}{\numberline {3.3.4}Fazit der Auswertung}{14}{subsubsection.3.3.4}
\contentsline {section}{\numberline {4}Ausblick}{15}{section.4}
\contentsline {subsection}{\numberline {4.1}Kryptographische Verfahren auf Mobilen Plattformen}{15}{subsection.4.1}
\contentsline {subsubsection}{\numberline {4.1.1}Symmetrische Verschl\IeC {\"u}sselungsverfahren}{15}{subsubsection.4.1.1}
\contentsline {subsubsection}{\numberline {4.1.2}Asymmetrische Verschl\IeC {\"u}sselungsverfahren}{16}{subsubsection.4.1.2}
\contentsline {subsection}{\numberline {4.2}Alternative \textit {location awareness} Verfahren}{17}{subsection.4.2}
\contentsline {subsection}{\numberline {4.3}Zusammenfassung}{17}{subsection.4.3}