Search results

Search list

Results in:

1-2 of 2 results

Information security - Key management - Part 8: Password-based key derivation

Information technology - High efficiency coding and media delivery in heterogeneous environments - Part 12: Image File Format - Amendment 1: Support for tone map derivation and other technologies

TOP