Cryptanalysis of Two Chaotic Maps-Based Authentication Schemes in Edge Computing | IEEE Conference Publication | IEEE Xplore