Cornell University Library Digital Collections
DECREE OF THE ATHENIAN SOLDIERS STATIONED AT ELEUSIS, PANAKTON, AND PHYLE IN HONOR OF THEIR GENERAL, THEOPHRASTOS. (IG II² 1303)
- Title:
- DECREE OF THE ATHENIAN SOLDIERS STATIONED AT ELEUSIS, PANAKTON, AND PHYLE IN HONOR OF THEIR GENERAL, THEOPHRASTOS. (IG II² 1303)
- Collection:
- Mysteries at Eleusis: Images of Inscriptions
- Creation Date:
- a. 216 aut paulo post
- ID Number:
- CD2699_042
- Accession Number:
- 204
- Reference Id:
- IE0207
- File Name:
- CD2699_042.tif
- Letter Height Type:
- letter height maximum
letter height minimum
- Culture:
- Greek (ancient)
- Style/Period:
- Greek (ancient)
- Materials/Techniques:
- Hymettian marble
- Measurement:
- 0.005 (meters)
0.006 (meters)
- Description:
- Decree of soldiers
- Bibliography:
- Archaiologike ephemeris
Clinton, Kevin, Eleusis, the Inscriptions on Stone
Inscriptiones Graecae vol. II²
Inscriptions of Eleusis accession
Skias
1303
1897, p. 42, no. 13
34
IE 207
IE0207
Archaiologike ephemeris 1897, p. 42, no. 13
AE 1897, p. 42, no. 13
- Repository:
- Archaeological Museum of Eleusis
- Series:
- Inscriptiones Graecae vol. II² 1303
IG vol. II² 1303
- Format:
- Image
- Rights:
- The Mysteries at Eleusis: Images of Inscriptions collection consists of images of ancient inscriptions on stone from Eleusis. The images were created by Professor Kevin Clinton (Department of Classics) as well as the institutions holding the items. Unless otherwise noted, images in this collection are believed to be in the public domain. Digital reproductions in this collection are provided by Cornell University Library for private study, scholarship and research use only. In accordance with Greek and EU laws, additional permissions from the holding institution and/or The Hellenic Republic Ministry of Culture and Sports may be required for any reuse. For more information about these items, please contact Professor Kevin Clinton (Department of Classics) at kmc1@cornell.edu. Responsibility for making an independent legal assessment of an item and securing any necessary permissions ultimately rests with persons desiring to use the item.