Cornell University Library Digital Collections
Fragment a of STATUE BASE DEDICATED BY DIOPHANTOS CHAIREPHANOUS ELEUSINIOS. (IG II² 4608 + 4934)
- Title:
- Fragment a of STATUE BASE DEDICATED BY DIOPHANTOS CHAIREPHANOUS ELEUSINIOS. (IG II² 4608 + 4934)
- Collection:
- Mysteries at Eleusis: Images of Inscriptions
- Creation Date:
- ca. a. 375 a.?
- ID Number:
- CD2699_020
- Accession Number:
- 989
- Reference Id:
- IE0058.a
- File Name:
- CD2699_020.tif
- Letter Height Type:
- letter height maximum
letter height minimum
- Culture:
- Greek (ancient)
- Style/Period:
- Greek (ancient)
- Materials/Techniques:
- white marble
- Measurement:
- 0.014 (meters)
0.019 (meters)
- Description:
- Dedication (statue base)
- Bibliography:
- Clinton, Kevin, Eleusis, the Inscriptions on Stone
Inscriptiones Graecae vol. II²
Inscriptions of Eleusis accession
Skias
4608
4934
772
IE 58a
IE0058.a
- Related Work:
- part of
STATUE BASE DEDICATED BY DIOPHANTOS CHAIREPHANOUS ELEUSINIOS. (IG II² 4608 + 4934)
- Repository:
- Archaeological Museum of Eleusis
- Series:
- Inscriptiones Graecae vol. II² 4608
Inscriptiones Graecae vol. II² 4934
IG vol. II² 4608
IG vol. II² 4934
- Format:
- Image
- Rights:
- The Mysteries at Eleusis: Images of Inscriptions collection consists of images of ancient inscriptions on stone from Eleusis. The images were created by Professor Kevin Clinton (Department of Classics) as well as the institutions holding the items. Unless otherwise noted, images in this collection are believed to be in the public domain. Digital reproductions in this collection are provided by Cornell University Library for private study, scholarship and research use only. In accordance with Greek and EU laws, additional permissions from the holding institution and/or The Hellenic Republic Ministry of Culture and Sports may be required for any reuse. For more information about these items, please contact Professor Kevin Clinton (Department of Classics) at kmc1@cornell.edu. Responsibility for making an independent legal assessment of an item and securing any necessary permissions ultimately rests with persons desiring to use the item.